Skip to main content

Full text of "United States Cryptologic History, Series VI, Vol. 5: American Cryptology During the Cold War, 1945-89"

See other formats


DOCID^ 



series VI 
volume 5 



-IOP-SEeRET" 



NO. 



903 



UNITED STATES CRYPTOLOGIC HISTORY 




,3 



■n 



o 

■-i 

a 
e 
5, 

3* 

JQ 
' rt* 

S" 
n 

o 

t 

sir 
I 

« 
SO 
« 
I 

03 
o 
o 

9T 




American Cryptology during the 
Cold War, 1945-1989 

Book I: The Struggle for Centralization 1945-1960 




o 

■3 
O 

n 
o 
:j 
n 
-i 



HANDLE VIA TALENT KEYHOLE COMINTCOjJIBOt-S* 
THIS DOCUMENJOTMj^II^^ 
NOIBEt6A8rtBT^TOFOREIGN NATIONALS 

Classified by NSA/CSSM 123-2 

Declassify on: Originating Agency's Determination Required 



JOINTLY 



national security agency 
central security service 



TOP SECRbl 




CCH-E32-95-03 
TCS-54649-95 



Approved for Release by NSA or 
37-31-2007. FOIA Case #4018E 



DOCID: 



3188691 



This monograph is a product of the National Security Agency history 
program. Its contents and conclusions are those of the author, based 
on original research, and do not necessarily represent the official 
views of the National Security Agency. Please address divergent 
opinion or additional detail to the Center for Cryptologic History 
(E322). 

This document is not to be used as a source 
for derivative classification decisions. 



691 



TOE SECRET UMBRA 



UNITED STATES CRYPTOLOGIC HISTORY 



A merican Cryptology during the 
Cold War, 1945-1989 
Book I: The Struggle for Centralization, 1945-1960 



CENTER FOR CRYPTOLOGIC HISTORY 
NATIONAL SECURITY AGENCY 

1995 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SYSTEMS JOIN T LY 
— NO T RELEASADLE TO FOREIQN NATIONALO 



Series VI 
The NS A Period 
1952 -Present 
Volume 5 



A Thomas R. Johnson 




TOP SCCnCT UMBRA 



DOCID: 



3188691 



TOPSCCnCTUMDnA 



Table of Contents 

Page 

Foreword '. ^ 

Preface xiii 

Acknowledgements " " xv 

BOOK I: THE STRUGGLE FOR CENTRALIZATION, 1945-1960 

Chapter 1: Cryptologic Triumph and Reorganization, 1941-1949 

World War II and the Intelligence Revolution 1 

The Way COMINT Was Organized at the End of the War . 7 

The CJO V.V.V.'.V. V.V 11 

The Cryptologic Allies 13 

Chapter 2: AFSA and the Creation of NSA 

The Stone Board 23 

afsa 26 

The Brownell Committee 33 

Korea gg 

The Country 3g 

The Asia Dilemma " 38 

The Invasion 4q 

The Murray Mission 41 

Counterattack 43 

China 43 

AFSA and ASA Operations 46 

White Horse Mountain 4g 

AFSS Introduces Tactical Warning 48 

The Navy 51 

The AFSA Factor 52 

Relations with ROK COMSEC and COMINT 52 

Korea - an Assessment 54 

Chapter 3: Cryptology under New Management 

Canine and the New Organization 62 

The Early Work Force 63 

Fielding the Field Offices 67 

Civilians in the Trenches- the Civop Program 69 

COMINT Reporting in Transition 69 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 0Y0TBM0 JOINTLY 
NOT RELEASABLB TO FOREIGN NA T IONALS 

iii ■ TOP SECRET jJM&ftft- 




DOCID: 3188691 



i(b) (1) 
M (b) (3) -50 USC 403 
! $8 (b) (3)-18 USC 798 
?#j (b) (31-P.L. 86-35 



TOP SECRET jjMMOC 



NSA Training - the Early Years 71 

Setting Up Security /....../;,.;! 73 

NSA and the U.S. Intelligence System . . /. . . ; , 75 

Consumer Groups Come to NSA . . jj. . ,/./. n 75 

The Struggle for Technical Control 76 

The Decentralization Plan i . . . /./. . Mi. i i 78 

Relations with the SCAs 80 

The SCAs Create Second Echelons 83 

Watching the Watchers . . /.;.../.;... u 85 

NSA and CIA - the Early Years 86 

CIA Enters the COMINT Business ..iu..u 89 

.L.J.i '. 90 

/.././. 91 



CIA and Cryptogr aphic Materials ;./.../. j 92 



(b) (1) 
(b) (3) 

OGA 






















94 
95 
96 
97 
98 
99 



CIA in the NSA /Trehches . 1 J..L 101 

./ / Li 102 

/. / /.J 103 



NSA's Other Cornpetitors / I . J. 107 

elint and NSA ; / l.j 108 

Buil ding the Overt C ollection System I.. I Ill 

/. ../ 112 

../ 118 

..i. 121 

./ 121 

J. 125 

./ 126 

/ 126 

t 127 

/ 127 

; 131 

132 




The Far North 



What It Was Like ; 132 

] 138 



SIGINT Goes Airborne 139 

BLUE SKY 140 

Peripheral Reconnaissance 140 

The Origins of Advisory Warning 143 

The RC-130 Shootdown , 144 

Advisory Warning Is Implemented 147 

The RB-47 Shootdown 148 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SYS T EMS JOINTL Y 
NOT IIELEA0ADLE TO FOREIGN NATIONALS 



TOP SECRET LjjytBWT 



iv 



;(b) (1) 

DOCID: 3188691 ftK^i 



TOPSCCBCTl JMgfiA 



Chapters The Soviet Problem 



The Early Days / . . j \ 157 

The Advent of BOURBON J. .A \ 158 

VENONA /..j \ 160 

"Black Friday" ./. . . \ 1 '. 168 

ASAandAFSATurntoRadibprinter \ 169 

The Soviet Strategic Threat J.. ...I L.. 170 

HowItBegan / 1 \ 171 

The American Response .../ \ 174 

The Soviet Atomic Bomb Project \ 176 

The Chinese Threat / |.. \ 178 

The Early Days of Overhead .\ .. 179 

The Attack on Soviet Cipher Systems S 184 



Tracking Submarines ■ 



] 187 

188 
189 



Chapter S: Building the Internal Mechanism 

Cryptology is Automated -The Story of Early Computerization 195 

Antecedents 1 195 

Postwar Developments j 197 

NSA Communications in the Pre-Criticomm Era 205 

The COMINT Comnet . . f 207 

Securing American Communications • 211 

The Era of the Wired Roior 211 

The Early Years of Secure Speech 214 

Organizing for COMSEC in the Postwar World 215 

AFSAM-7 i 217 

The Push for On-line Epcipherment 218 

From SIGSALY to Modern Voice Encryption 220 

TEMPEST i 221 

Chapter 6: Cryptology at Mid-decade 

The Early Assessments . . i 227 

The Robertson Committee 227 

The Hoover Commission 228 

The Killian Board j 229 

The Jackson Report i 231 

1956 I ; 232 

Suez i ; 232 

Hungary J 235 

] 236 



Lebanon, 1958 237 

1956 in History 239 



HANDLE VIA TALEM 1 KEYHOLE COMINT CONTROL 3Y3TGM3 JOINTLY 
— IMO ' l 1 HE-LEASABLE 10 FOREIGN NATIONALS 



V 



DOCID: 3188691 



- TOPSCCREI^ WMrtft 



The Reorganization 239 

The Move 241 

Chapter 7: The Eisenhower Reforms 

The Post-crisis Centralization of the SIGINT system 253 

Criticomm , ' 253 

The Baker Panel . . . ....].. 256 

The Reuben Robertson Report 259 

The marriage of elint and NSA 260 

The Kirkpatrick Committee 263 

NSA Centralizes the Field System ; 264 

AFSS and the Development of Second-Echelon Reporting 265 

The Struggle for Control in the Pacific . . . " 268 

Samford Joins the Agency 269 

The Tordella Era Begins 271 

Public Law 86-36 272 

NSA and the American Public - The Issue of Legality 272 

Public Revelations and Cryptologic Secrecy 274 

Classifying Cryptologic Information j... 275 

Breaches in the Dike -The Security Cases 277 

L* Affaire Weisband 277 

The Petersen Case 279 

Martin and Mitchell 280 



Non - Responsive 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL QYDTEM3 JOINTLY 
NOT ItELEAOADLE TO FOREIGN NATIONALS 



TOP SECRET UflflBft?C~ 



vi 



DOCID: 3188691 



TOP SECRET Lj Mgfi/T 



Non - Responsive 



HANDLE VIA TALENT KEYHOLE COMIWT CONTROL SYSTEMS JOIN T LY 
— NOT RELEASABLB TO FOREICN NATIONALS 



vii TOP SECnET - U BJBRjC 



DOCID: 



3188691 

- TO P SCCIlCTlj MgfiA 



Non - Responsive 



HANDLE VIA TALENT KEYHOLE COMIMT CONTROL OTOTEMa JOINTLY 
NOT RELEAOADLE TO FOREIGN NATIONAL S - 



viii 



DOCID: 



3188691 



Non - Responsive 



HANDLE VIA TALENT KEYHOLE COMraTCOOTROL3YSTEMS JOINTLY 
WOT ItELEABAHLE TO FOREIGN NATIONALS — 



— T OP 3CCKCTU 



DOCID: 3188691 

TOP SCCRETJ jMgfiA 




HANDLE VIA TALENT KE YIIOLB COMIMT CONTROL 0TTOTEM3 JOINTLY 
NOT ItELEASADLE TO FOREIGN NATIONALO — 



TO P SECRETJJ MgfiX" 



x 



DOCID: 3188691 



TOPSECREU UMgfi/T 

Foreword 



(U) The Center for Cryptologic History (CCH) and its predecessors have 
published thirty-seven volumes - monographs, crisis studies, source documents, 
bibliographies - concerning the history of signals intelligence and information 
systems security, the yin and yang of modern cryptology. These publications 
have treated specific events, organizational issues, and technical 
developments in peace and war; most have been pioneering efforts, based on 
original documentation, and, in many cases, are the first history of their 
particular topic in any venue. 

(U) There has been a strong need, however, for a single work to undertake 
the fuU sweep of cryptologic history, providing a context into which the more 
specialized studies may be placed. Such a cryptologic Cook's tour should 
incorporate the military-political events of our time and the history of 
interaction between cryptologic organizations and other components of the 
intelligence community - access to SIGINT and INFOSEC is limited to 
"insiders," but it is clear that cryptologic operations do not occur in a vacuum. 

(U) Thomas R. Johnson's American Cryptology during the Cold War, 1945- 
1989 meets these requirements admirably. Drawing on over a decade of study 
and reflection on cryptologic history, Dr. Johnson deals with three facets of 
cryptologic history: first he explains how cryptology responded to the 
landmark events and challenges of the post-World War II era. He next provides 
profound analysis of how events and personalities affected the development of 
cryptology institutionally and professionally. Finally, and even better, Dr. 
Johnson spins a fascinating tale of the success or failure of cryptologic 
operations in the various crises that have challenged the SIGINT system. 

(U) With Books One and Two of this projected four-book work now 
available, American Cryptology during the Cold War is "must reading" for the 
cryptologic professional. The narrative and analysis in these first two books 
are essential background for understanding how the cryptologic community 
progressed to its present configuration. This is the definitive work on 
American cryptology after World War II. 

(U) For readers who may wish to explore American cryptology prior to the 
modern period, I recommend as a companion piece to the present book, Dr. 
Ralph E. Weber's Masked Dispatches: Cryptograms and Cryptology in 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 3YS T BMS JOINTLY 
NOT BFT TT ft SABLE TO rOREIQIf U AllONALb ■ 




DOCID: 3188691 



■ TOP SCCRCT U MBRA 



American History, 1775-1900 (CCH, 1993). Two more useful books with 
background on pre-World War and World War II cryptology are Frederick D. 
Parker's Pearl Harbor Revisited: United States Navy Communications 
Intelligence, 1924-1941 (CCH, 1994) and Thomas L. Burns's The Origins of the 
National Security Agency, 1940-1952 (CCH, 1990). 



David A. Hatch 
Director, 
Center for Cryptologic History 



■ HANDLE VIA .TALENT KEYHOLE OOMINT OONTROL OVQTE MB JOINTLY 
NOT RELEAOADLE TO FOREIGN NATIONALS 



TOP 3CCRCTLj JtfBl(X* 



xii 



BOCID: 3188691 



Preface 

What It Is and What It Is Not 

This book is intended to be a general overview of U.S. government 
cryptology since the end of World War II. It is projected to be a four-book 
study carrying the story to the end of the Cold War, symbolized by the fall of 
the Berlin Wall. 

I have attempted to include the entire effort, which includes the Service 
Cryptologic Agencies (as they were once called), as well as certain CIA 
programs. These organizations comprised almost the totality of the 
cryptologic efforts of the federal government, although other organizations 
(FBI is a good example) have occasionally dabbled in the discipline. Because it 
is comprehensive rather than strictly organizational, it contains information 
about the field sites, intermediate headquarters and the SCA headquarters 
themselves. It does not cover in detail the organizational aspects of the 
creation of the National Security Agency. That is covered in good detail in 
Thomas L. Burns's book, The Origins of the National Security Agency: 1940- 
1952, published in 1990. Thus the coverage of events between 1945 and 1952 
is sketchy and simply tries to fill in blanks in the record that the Burns book 
did not cover. 

This is not a history of private or nongovernmental cryptology. Although 
it covers relationships with our Second and Third Party partners, it does not 
focus on that aspect either, except as it contributed to the development of our 
own effort. Our long-standing debt to the British cryptologic effort at GCHQ 
should not go unnoticed, however. It deserves a separate book. 

If you are looking for a history of your specific organization, you will not 
find it. This is a history of events, not organizations. The importance of the 
cryptologic contribution to American security is so broad as to obscure 
individual organizations and, often, the specific people involved. In certain 
cases, however, I have identified major individual contributors to cryptologic 
history or those who were, by chance, thrown into momentous events. 

Two overarching themes characterized American cryptology from the end 
of World War II to the end of the first Nixon administration; centralization 
and expansion. The SIGINT system underwent a period of almost unbroken 
expansion from 1945 to the American retreat from Southeast Asia. These 
themes dominate the first two books in the set. 

The end of the Vietnam War and the era of the Watergate scandals that 
followed marked a watershed, and new themes of retrenchment and 
decentralization marked the period that followed. These will be the themes 
that open Book III. 

THOMAS R. JOHNSON 



HANDLE VIA TALENT KE YHOT ,fi f.OMTNT riONTn T 1 'i' ' I 'I PiM'j JlJlLllJ_r" 
— UCIT HELEAilAHLK TO KOKKIUN NATIONALS 



Xlll 



IQESECRSWHWffRTT 



DOCID: 3188691 



/.(b) (3)-P.L. 86-36 



Acknowledgements 



My debt to others begins with the staff of ' the NSA Archives, who dropped whatever 

the Archives helped 



they were doing whenever I needed material if 



with photographs, and the staff in L32 produced, hundreds of black and white prints to go 
into the publication.p~T \~^ n E31 (Geographies) did most of the map work. My 



iiatu uiie yuom;aHon. | / 5 m (.ueograp. 

debt also includes the CIA staff historians, especiallyf 



who guided my work aiid opened doojrs to CIA materia}. 
My thanks al so go to the editorial staff of Barry Carleeii 



and£ 



us history. It was the longest 



and | who/ for days on end, did nothing but edit t „._..__ 

work that the Center for Cryptologic- History has attempted, and I am sure it taxed their 
patience, although they never said so! Also owing to the unusual length and complexity of 
the book, the NSA photo laboratory $23) and NSA's printing services (Y19), which did the 
photo reproduction* an d printing of thif book, should be recognized for their major efforts to 



get out the publication 



deserves praise for the cover graphics. 



In the Services Cryptologic Agencies, James Gilbert and Jack Finnegan, the INSCOM 
historians, were/very responsive to my need for Army cryptologic materials. A special debt 
is also owed the/historical staff at the Air Intelligence Agency. Everyone on the staff, from 
James Pierson/(now retired) to Jo Ann Himes to Joyce Homs to Juan Jimenez, responded 
almost instantly to my many requests for information. Their help resulted in a rather 
more thorough treatment of Air Force cryptology than would have been possible 
otherwise. / 

The history itself has had a large number of "readers" who plowed through'the various 
drafts and Revisions offering helpful comments and additional information. Everyone in 
the Center for Cryptologic History (CCH) had a hand in its improvement, as well a s a list 
of other r eaders who critiqued various portions. Among them, David Gaddy andl 



leserve special note for their help with the chapter on Vietnam. 



The history also had a group of "general readers," senior Agency officials who agreed 
to read the entire work in draft state. Milton Zaslow, Cecil Phillips, Donald Parsons, 
Eugene Becker, and David Boak spent long hours poring over various drafts, offering 
comments and encouragement and correcting information. 

Finally, I wish to thank all those who, over the years, volunteered their time to sit for 
oral history interviews. NSA owes them all a debt of gratitude for their contributions to 
retrieving otherwise vanished information. 

THOMAS R. JOHNSON 



JOINTLY 




HANDLE VIA TALENT KEYHOLE COMINTCONJ 

NOT RELMSAWiBWrolElSJNATIONALS 



xv 



DOCID: 



3188691 



_JOPS££BEHtmt& 

Footnotes 



The text is footnoted throughout with short, abbreviated citations. More complete 
information can be obtained in the Bibliography. However, a few comments on certain 
footnote abbreviations are in order. 

The largest number of citations is from the Cryptologic History Collection, which is the 
working file of the Center for Cryptologic History. This collection is organized into sixteen 
series, and citations to that collection begin with the series number and a series of numbers 
e.g., CCH Series V.A.29. 

Citations from the NSA Archives vary depending on whether the document was part of 
an archived collection or was still in the Retired Records collection when researched. The 
former begins with the accession number, followed by a location, e.g., ACC 16824,CBTB 26. 
The latter begins with a box number, followed by a shelf location, e.g., 28791 -2, 80-079. 

A general bibliography and an index are included at the end of Book II. 



HANDLE VIA TALENT KE YH0LEC0JflN»6©NTS0L SYSTEMS JOINTLY 
NOTREJLfiAS3tBL^TOPOHEIGN NATIONALS 



xvii TOjELSKfterOMBRA 



BOCID: 3188691 



TOPSirnrritMnrm — 

Chapter 1 

Cryptologic Triumph and Reorganization, 

1941-1949 

..-•■ •"(b) (1 

The combined U.S.-U.K. COMINT operation of World War II was perhaps the most successful .... ^ 1 3 

large-scale intelligence operation in history. 

31A, 1971 



WORLD WAR II AND THE INTELLIGENCE REVOLUTION 

The Second World War began a true "revolution" in intelligence. The impact of 
intelligence on the strategy and tactics of the Allies (and to a somewhat lesser extent on 
the Germans and Japanese) was truly revolutionary, and it is just now coming to be 
recognized for what it was. Through the publication of books like Frederick 
Winterbotham's The Ultra Secret and John Masterman's The Double Cross System and by 
the massive declassification of war records begun by the British and Americans in 1977, 
the true extent of this influence is now emerging. 

No other intelligence source had the revolutionary impact of SIGINT. World War II 
was, in the words of historian Walter Laqueur, "a SIGINT war." The influence of SIGINT was 
so pervasive that it is now hard to imagine how we might have fought the war without it. 
Even prior to the direct engagement of American and British forces against the Germans 
and Japanese, two of their most complex ciphers were broken. The British effort at 
Bletchley Park first produced plaintext reports from the German ENIGMA system in 
September 1940, the same month that a small Army team under William F. Friedman 
broke the Japanese diplomatic cipher machine called PURPLE. By February of 1942 the 
Navy had broken the Japanese Fleet Operational Code, called JN25. In 1943 the Army 
broke the Water Transport Code, while in 1944 a lucky battlefield retrieval of cipher 
material allowed the Army to read the Japanese Army codes. When combined with 
successes in direction finding, traffic analysis, and the exploitation of plaintext 
communications, SIGINT yielded a torrent of useful information. 

British achievements have come in for the most scrutiny (and praise). We know that 
Churchill "revelled" in his ability to read Hitler's mail and spent hours pondering on Nazi 
strategy as revealed in the decrypted messages. The British set up a very efficient and 
secure system for disseminating SIGINT, the precursor of our SSO (Special Security Officer) 
system. Always wary of the "blabbermouth" Americans, they insisted that we adopt their 
system before they would share everything in the SIGINT larder with us. As the Combined 
Chiefs prepared for Overlord, they knew precisely how the Germans were reacting to the 
invasion plans and where they were positioning their units for the expected blow. 



HANDLE VIA TALENT KEYH OLE COMINT rQ T^TnriT PTlTMi TOTUTT T 
NQTTTTTTir i'i Mill ro FOTfrTHTT NATIONALS 



1 



DOCID: 3188691 



TOP SECRET Ij MffRA 



Moreover, once the invasion was launched, they knew what the Germans were doing and 
were able to adjust accordingly. As Allied troops moved across France, they moved in sync 
with the gold mine of intelligence which detailed most of the important German military 
movements. Their intelligence officers must have looked like geniuses - they were able to 
predict German moves before they happened and could advise commanders how to react. If 
every dog has its day, this was the day of the G-2, the military intelligence officer. The 
product of breaking high-grade ciphers was called ULTRA, and it was so good that when it 
was not available, as it was not at the Battle of the Bulge, the G2 corps scarcely knew what 
to do. A few predicted the German offensive, but most did not. They were wedded to the 
SSO and the bonanza of information that he could provide. 

The Pacific was the American theater, and the U.S. was as successful there as the 
British were in Europe. Navy cryptanalysts broke JN25 in time for Admiral Nimitz to use 
it in the Battle of Coral Sea in May of 1942. The success of strategic SIGINT was so 
important that Nimitz had become a permanent convert. When the cryptologists at Pearl 
Harbor came to Nimitz with information outlining a much bigger battle shaping up in the 
central Pacific, the admiral was quick to believe and quick to act. To his dying day he 
credited SIGINT with the key to the victory at Midway. This turned the war in the Pacific 
completely around and launched Nimitz on his Central Pacific campaign which took him 
to Okinawa. He considered SIGINT as an absolutely critical component, and he learned to 
use information from both the high-grade cipher traffic and the plaintext messages and 
operator chatter. Some of his subordinates were as successful as Nimitz in the use of this 
intelligence, some were not. But it is hard to argue with results. 

SIGINT and MacArthur had a turbulent marriage. The commander in the Southwest 
Pacific had outstanding success in using SIGINT on some occasions, the most conspicuous 
success coming in his 1944 New Guinea campaign. There were also some failures 
resulting from several causes. His staff never came to trust SIGINT as did that of Nimitz. 
When they did use it, it was sometimes hard to get it melded into the battle plan, as 
MacArthur was a classical intuitive decision maker. Jurisdictional disputes between 
MacArthur and the War Department in Washington caused him to come to distrust this 
strange SSO lash-up which he could not control because it did not work for him. 

In the battle for the sea lanes, SIGINT again played a decisive role. The Japanese 
merchant marine was devastated largely because its movements were being given away in 
the Water Transport Code. Sinking the defenseless and slow-moving merchant vessels 
was relatively easy when their movements were known beforehand. In the Atlantic, the 
U.S. and the British used decrypted ENIGMA messages to track German U-boats and to 
drive their wolf packs from the sea lanes. This was not quite as easy as going after 
merchantmen, and the marriage between SIGINT information and operational procedures 
to effect a kill represented a very high level of military and technological expertise. It may 
have been the most difficult and delicate use of SIGINT during the war. 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SYSTEMS JOINTLY 
NOT RBLEASADLE TO FOREIGN NATIONALS 




2 



DOCID: 3188691 




One other wartime accomplishment would become significant in later years. In 1944 
the British and Americans established a Target Intelligence Committee (TICOM) to 
interrogate captured German COMINT personnel. The major objective was COMSEC - to 
determine how well the German cryptologists had exploited Allied communications. The 
flip side of that effort was COMINT - to see how well the Germans were doing against other, 
and particularly Soviet, communications. TICOM was at Bletchley. Park, headquarters for 
the British cryptologic service, Government Code and Cipher School (GC&CS). Six teams 
of American and British COMINTers were dispatched to the battlefields of the Continent. 
They sent their "take" to the Document Center at GC&CS. The original documents 
remained there while the microfilm copies were sent on to Washington. TICOM teams 
also captured equipment. One-of-a-kind equipment remained at GC&CS, while duplicates 
were sent to the United States. 

The new system was so successful that teams were established in the Pacific, with the 
British taking the lead in Southeast Asia, the United States in the Central Pacific and 
Japan, and joint American and Australian teams in Rabaul and Borneo. Although 
TICOM was formally dissolved in November of 1945, American and British experts 
continued to exploit the material for years afterward, and TICOM was later re-created in 
the United States as TAREX (Target Exploitation), minus British participation. 

If the strength of American SIGINT was in providing militarily useful information, its 
weakness was in its organization. The Army and Navy were at constant loggerheads over 
the control of cryptology, and at times the factional disputes were little short of 
catastrophic. British historian Ronald Lewin, a great admirer of American technical 
ingenuity which yielded the SIGINT bonanza, was frankly contemptuous of our inability to 
get along: 

The old antagonism and suspicion between Army and Navy persisted in a manner that may at 
times seem infantile, until it be remembered that tribal loyalty, narrowness of vision, and sheer 
egocentricity can make even the most senior and hardened officers occasionally enter a second 
childhood. 1 

Army and Navy cryptologic organizations had a long and inglorious history of failing 
to coordinate their efforts, dating back to the 1920s. In 1940, when the Army's success in 
breaking Japanese diplomatic cipher systems became known to the Navy, there ensued 
lengthy and difficult negotiations to determine how the effort was to be divided. They 
finally arrived at a Solomonic solution by which the Army processed Japanese diplomatic 
traffic originating (i.e., cipher date) on even days of the month while the Navy would 
process traffic from odd days. This resulted in a fair division politically, but from the 
standpoint of cryptanalytic continuity it was a horror. To make matters even worse, there 
was in those days no thought, no concept, of centralized and coordinated intelligence 
analysis. What little analysis and interpretation was done (and there was very little 
indeed) was accomplished by each service on the traffic which it had decrypted, leaving for 
each a checkerboard pattern of information in which every other day was left out. This 



IIAinjLB VIA TALENT KEYHOLE COMINT CONTROL 3Y3TBMS JOINTLY 
NQTRKT BASABLE TO FOREICN NATIONALS 



3 




DOCID: 3188691 



TOP .SECRET UMJ RA 

almost inconceivable situation persisted until 1942, when diplomatic traffic was, by 
mutual agreement, left to the Army, while the Navy concentrated on Japanese naval 
material. 2 

The disaster at Pearl Harbor 
resulted in a thoroughgoing Army 
internal investigation. Secretary of 
War Henry Stimson picked Yale 
lawyer Alfred McCormack to lead the 
way. McCormack discovered a 
scandalously incompetent Army G2 
and a nonexistent SIGINT. analysis and 
dissemination system. He set up a 
separate system called Special Branch, 
Military Intelligence Division, and was 
picked as the first deputy. (Colonel 
Carter W. Clarke became the first 
commander.) At the same time, the 
Army and Navy arrived at a joint 
modus operandi regarding the division 
of overall SIGINT responsibilities. Each 
service was to work what we now call 
"counterpart" targets, Since there was 
little in the way of Japanese Army 
traffic to work, the Army took on the 
task of diplomatic intercept. The third 
partner was the FBI, which shared 
Alfred McCormack with the Navy the task of working 

Western Hemisphere agent and clandestine traffic. These three were tobe the only 
participants in SIGINT for the duration of the war. Roosevelt's directive of July 1942 
specifically excluded the FCC (Federal Communications Commission), Office of 
Censorship, and the OSS (Office of Strategic Services) from SIGINT production . 3 

At the same time a standing committee of Army, Navy, and FBI COMINT officials was 
established. It met only a few times and had little lasting impact on organizational 
matters. Meetings were frequently marred by vituperative arguments, especially between 
Navy and FBI, which were supposed to be sharing. Western Hemisphere clandestine 
traffic. It was not cryptology's finest hour. Meanwhile, the COMINT activities of the FCC 
and Censorship Bureau continued virtually unabated." Only the OSS seems to have been 
temporarily frozen out of the COMINT community. Resurrected after the war as the CIA, it 




HANDLE VIA TALENT KEYHOLE OOMINT CONTROL SYSTEMS JOINTLY 
LWl KELMbADLE TU BOALIGN NATIONALS 




DOCID: 3188691 



TOP SECRET I 



exacted revenge over a period of many years for having been excluded from wartime 
cryptology. 




Carter Clarke, bead of Special Branch of Military Intelligence Service 

The Army and Navy cryptologic organizations, Signal Security Agency (SSA) and OP- 
20-G, respectively, found cooperation difficult. The Army was willing to share everything 
it had with the Navy, but OP-20-G would not reciprocate. What finally brought matters to 
a head was the breaking of the Japanese Army code in early 1944. This produced 
information vital to the Navy in the Southwest Pacific. SSA decided to withhold 
information from it until the Navy agreed to expand cooperation. The Navy quickly came 
around, and the result was a wartime agreement signed by Army Chief of Staff General 
George Catlett Marshall and Chief of Naval Operations Admiral Earnest J. King. Called 
the Marshall-King Agreement, it provided for the total exchange of COMINT materials (but 
at the Washington level only). 5 

It quickly fell apart, and for a time this informal agreement seemed a dead letter. But 
the need to cooperate was by then so vital that the two services were driven to a more 
permanent solution. Thus was formed the Army-Navy Communications Intelligence 
Coordinating Committee (ANCICC) in April of 1944. The committee was to coordinate 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL BT3TEMS JOINTLY 
NOT BELE ASABLB TO FOItEIQN MATIOHALO 



5 



RA 



DOCID: 3188691 

TOP SECRET UftftgRA 



and settle "such controversial matters as can be resolved without reference to higher 
authority," a plain attempt to keep disagreements out of the offices of Marshall and King. 
Although the Navy was consistently the more parochial of the two services in GOMINT 
matters, the "godfather" of this cooperation was almost certainly Joseph Wenger, a naval 
commander and career cryptologist within OP-20-G. Meanwhile, coordination under the 
terms of the Marshall-King Agreement continued its bumpy course, now underpinned by 
this policy committee. 6 





Joseph Wenger 

In late 1944 the Navy (probably Wenger) once again suggested improving cooperation. 
This time they proposed creating a new board called the Army-Navy Communications 
Intelligence Board (ANCIB). Representation would be of a higher level - instead of the 
heads of the cryptologic organizations, the members were to be the heads of intelligence 
and communications for the two services. The board would be formally established 
(ANCICC was informal) and would be approved by Marshall and King. Although the 
Army initially answered "No," it later changed its mind, and ANCIB became official in 
March 1945. ANCICC became a working committee of ANCIB, insuring that the heads of 
COMINT organizations would continue to meet. To keep COMINT out of the JCS arena (in 



HANDLE VIA TALENT KEYHOLE COMINT CONTROLSY0TEM8 JOINTLY 
NOT IIBLEASADLE TO FOREIGN - NATIONALS 



TOP SECRETE MffRA 



6 



DOCID: 3188691 



TOP SECRET 




order to tighten security), ANCIB reported directly to the Chairman of the Joint Chiefs of 
Staff, rather than through the Joint Staff. 

FBI was not invited to be a member of the board, a deliberate move which was 
occasioned by Navy-FBI friction over the control of clandestine intelligence. But in 
December 1945, the State Department was invited, and ANCIB became STANCIB. This 
recognized the existence of a small COMINT exploitation unit at State and implicitly 
acknowledged that State would have to be invited if ANCIB were to represent the United 
States in postwar COMINT negotiations with the British. In 1946 the board changed name 
once again, to USCIB (the United States Communications Intelligence Board), a lineal 
predecessor of today's National Foreign Intelligence Board. At virtually the same time, 
the newly created Central Intelligence Group, soon to change its name to CIA, accepted an 
invitation to join. Through all this, ANCICC changed to STANCICC and then to 
USCICC. 7 

No matter what the name of the board, cooperation remained purely voluntary, and all 
decisions required unanimity. There was no higher authority imposing central control of 
COMINT. The British, who had a unified COMINT service under the Government Code and 
Cipher School (GCCS), were scandalized. During the war they were forced to deal 
separately with the three organizations with COMINT interests - the Army, Navy, and FBI. 
British officials regarded negotiations with the Americans as a little like dealing with the 
former colonies after the American Revolution - disorganized and frustrating at times, but 
they could still play one off against another to achieve their objectives. 



THE WAY COMINT WAS ORGANIZED AT THE END OF THE WAR 

The cryptologic system that emerged from World War II was profoundly and 
tenaciously decentralized. Instead of a central control (like NSA) and Service Cryptologic 
Elements (SCEs) as we know them, there were only the separate COMINT organizations of 
the Army, Navy, and FBI. Naval COMINT was under an organization called the 
Supplemental Radio Branch and designated OP-20-G, part of Naval Communications. 
There was a headquarters in Washington called CSAW (Communications Supplementary 
Activity, Washington) where centralized processing functions were performed, chiefly 
against the German naval ENIGMA problem. For the Pacific theater there were virtually 
independent processing centers: one in Hawaii, called FRUPAC (Fleet Radio Unit, 
Pacific); one at Melbourne, Australia, called FRUMEL (Fleet Radio Unit, Melbourne) and, 
late in the war, one on Guam, designated RAGFOR (Radio Analysis Group, Forward). 

Naval COMINT had grown through the years. From its beginnings in 1924 with one 
officer, Laurance Safford, and a single civilian, Agnes Driscoll, OP-20-G had by 1941 
increased to 730 bodies. During the war the number of intercept sites in the Pacific 
increased from four to eight, and the receivers allocated to Japanese intercept increased 



HANDLE VIA TALENT KEYHOLE 00MIHT CONTROL flYQTEMO JOINTLY 
NOT ItELEASADLE TO FOREIGN NATIONALS 

7 TOP SECRET U MBRA 



DOCID: 3188691 



-TOP SECRE T UMBRA 



from 68 to 775. Shipborne collection began with one operator and one receiver in the 
Pacific in 1941, but by 1945 there were eight shipborne operator teams with 120 receivers. 
Yet in 1945 the entire system quickly collapsed. OP-20-G closed ten of its sixteen intercept 
and DF stations. When the war ended, the German cipher exploitation section went from 
over 2,000 to only 200. 

Since its creation, OP-20-G headquarters had been in the Navy Building on 
Constitution Avenue in Washington. COMINT success required more people and more 
space to work the traffic, and the Navy began looking for a separate facility for its most 
secret activity. They found it in the fall of 1942, at a girl's school on Nebraska Avenue 
called the Mount Vernon Seminary for Women. The Navy bought it for about $1 million 
and began converting the ivy-covered red brick structure into a military facility. One of 
the first things they did was to build new barracks for the 4,000 WAVES (Women Accepted 
for Volunteer Emergency Service) who were brought in primarily to operate the "bombes" 
that deciphered ENIGMA messages from German submarines. 8 

The Army, too, took over a girls' school. In 1942 Signal Intelligence Service (SIS) was, 
like OP-20-G, looking for a new and larger home. Then it found Arlington Hall, a junior 
college located in the rolling hills of suburban Arlington. The school was big on horses and 
equestrian pursuits but had always been short on cash. Its founder, a Dr. Martin, went 
bankrupt in 1929, and the school limped along on a hand-to-mouth existence until it was 
mercifully extinguished by the Army. Paying $650,000 for the property, SIS acquired it in 
June of 1942 and moved from the Munitions Building, which stood beside the Navy 
Building on Constitution Avenue. 9 

Organizationally, SIS was similar to OP-20-G. Although it changed its name to 
Signal Security Agency (SSA) in 1943, it remained part of the Signal Corps. In September 
1945 it was finally severed from Army communications, attaining status as an 
independent command called Army Security Agency (ASA), an implicit recognition of its 
contributions to winning the war. Elevated status gave it a two-star command billet and 
an independent position in the Army hierarchy, but it now took its operational direction 
from Army intelligence. This placed it back in roughly the same position that it had been 
when, in the 1920s, it had been named MI-8 and had been under G2. 10 

For SIS, intercept work was more difficult than for OP-20-G because the Army lacked 
geographic access. During the early 1930s, SIS relied on the telegraph cable companies to 
provide it with message traffic. The earliest SIS efforts to develop intercept sites resulted 
in stations in Hawaii and Panama later in the decade, and by 1938 SIS had additional sites 
at the Presidio in San Francisco, Fort Sam Houston in Texas, and Fort Hughes in Manila. 
In 1942 SIS attempted to hear German transmissions from a new site (USM-1) at Vint Hill 
Farms in northern Virginia. By the end of the war, SSA had eleven intercept stations. 
The force at Arlington Hall numbered 7,848, of whom 5,661 were civilians. 11 



HANDLE VIA TALENT KEYHOLE OOMINT CONTROL SYSTEMS JOINTLY 
NOT RELEADADLE TO FOREIGN NATIONALS 

top secret ur^RA 8 



DOCID: 



3188691 




Government offices on the Mall 
SIS and OP-20-G began World War H in these temporary buildings on the Mall in Washingti 




Arlington Hall Station in the 1940s 



HANDLE VIA TALENT KEYHOLE COMINT OONTROL 3Y3TEM3 JOINTLY 
■ MOT RELEA3ADLE TO FOREIGN NATIONALS 



9 



JOP BCCULIU MflRA 



DOCID: 3188691 



•/(b) (I) 

!? (b) (3) -50 USC 403 
: (b) (3)-P.l. 86-36 



TOP SECRET 




To Army cryptology, as to the Navy, peace was devastating/Mopi of the work force at 
Arlington Hall left civilian government service, and within days -the halls were almost 
empty. Intercept sites overseas were suddenly confronted with rio Japanese or German 
intercept mission. One former soldier described the experience as being left stranded on 
Okinawa with no Japanese mission to copy and no instructions on a/follow-on assignment. 
His unit eventually moved to Seoul, relocated to a/former ..Japanese communications 
station, and there got a new mission - Soviet and.Chinese Communist communications. 
European units tackled French and Greek missions, and/by mid-1946 nearly half the 
Army's end product was based on the intercept of French communications. 12 

The late 1940s were a period of damaging retrenchment- The Army and Navy 
cryptologic organizations that began the Soviet mission had little experience, less money, 
and no expertise. Yet ASA was able to survive better. than OP-20-G. The Army had relied 
historically on civilians, and many of the best, including William Friedman, Frank 
Rowlett, Abraham Sinkov, and Solomon Kullback/ stayed/bn. Missing the excitement of 
wartime cryptology, others drifted back to Arlington Hall after brief, humdrum civilian 
careers. The Navy, which had relied on uniformed cryptologists, lost a far higher number 
to civilian life and found the transition to peacetime a difficult one. 

In 1947 ASA and OP-20-G were joined by yet a third cryptologic service, that of the 
newly created Air Force. The Army Air Corps had actually established its sigint service 
in the Pacific in 1944. . The Air Force acquired an early reputation for parochialism and 
interservice rivalry. . The feuding led Carter Clarke, then head of Special Branch of 
Military Intellige nce Service, to write ih June 1944 that "the Air Force insists that these 

operate only for the Air Force and insists further that no personnel can 

be attached or detached therefrom; neither should the theaters give them any operational 
directives in the sense that we thin k of it." The iirst Air Force unit in the Pacific was the 

which began/operations in 1944 in New Guinea. 13 

When the independent Air Force was created in 1947, there was no direct reference to 
cryptologic activities, and for a time ASA continued to provide these to the nascent Air 
Force. Yet the Air Force was determined to establish its own capability. Certain Air Force 
generals were aware of the contributions 6f COMINT during the war. One in particular, 
Hoyt S. Va.ndenberg, who was later to become Air Force chief of staff, was convinced that 
the Air Force had to have its own cryptologic service. He saw how the British controlled 
cryptology in Europe and felt that it Was essential to get this under American, and 
particularly Air Force, control. w 

In early 1948 the Air Force fashioned a transition agreement with ASA. The latter 
established an Air Force Se curity G roup within its headquarters at Arlington Hall to 
oversee the transfer. Three I l and eight COMSEC units were turned over to the Air 
Force. The Air Force role was defined as mobile and tactical, and ASA continued to 
operate all fixed sites. A set number of ASA officers (thirty-two) became blue-suiters, and 
this group became the "founding fathers" of Air Force cryptology. Air Force cryptologists 

HANDLE VIA TALENT KEYHOLE COMINT CONTROL 3Y0TEM3 JOINTLY 
NOT RELEASABLE TO FOREIGN NATIONALS 

JOPSCCnCT -UMg^A 10 



DOCID: 3188691 



■ TOP SECRE ' I 




were to continue to train at ASA schools and were to contribute instructors and financial 
support as soon as the Air Force had a budget of its own. Significantly, the Air Force 
assumed all responsibility for "the investigation for intelligence purposes of all types of 
electronic emissions relating to radar, radio control of guided missiles and pilotless 
aircraft, proximity fuses, electronic navigation systems, infrared equipment and related 
subjects." In other words, the Air Force was to take the ELINT and electronic warfare 
missions, which were at the time too new to even have a name. Needing equipment but 
not yet having a budget, the Air Force arranged for the transfer of equipment from the 
Army, which turned out to be cast-off receivers and antennas that ASA no longer wanted. 15 

On 20 October 1948, the new Air Force cryptologic organization was officially 
established as the U.S. Air Force Security Service (USAFSS), still located at Arlington 
Hall. It was a major air command, responsible to neither intelligence nor. communications. 
Thus from its earliest existence the Air Force accorded a loftier organizational position to 
its cryptologic service than did the other, more senior, services. And the Air Force did 
something else that was unprecedented. In May of 1949 it moved completely out of 
Washington. Security Service set up shop at Brooks Air Force Base outside of San 
Antonio, Texas. The move was calculated to remove USAFSS from geographical 
proximity to the central control authority for COMINT - at the time the Coordinator for 
Joint Operations, shortly to become the Armed Forces Security Agency. Thus USAFSS 
hoped to be insulated from any sort of outside control, which it regarded as bald, 
interference in its affairs. 16 



THE CJO 

The lack of central control for COMINT was the most pressing problem of the postwar 
years. Cooler heads recognized that the uncoordinated and fractionalized efforts that had 
existed since the 1920s simply had to be better controlled. They had already agreed on a 
committee system, at that time called STANCIB and STANCICC. The committees could 
and did arrive at policy decisions which, in the case of unanimity of the board, were 
binding on the services. What was still lacking, though, was an executive organization to 
carry out the routine business of central coordination. 

In early 1946 the Navy proposed such an executive body. They called it the 
Coordinator for Joint Operations, and it was to work out routine intercept coverage and 
processing responsibilities between the services. The Navy got Army concurrence, and on 
15 February STANCIB approved the proposal. The Coordinator for Joint Operations, or 
CJO, was born. 17 

The CJO was to implement general policies on allocation of joint tasks as approved by 
STANCIB. It was to be assisted by three groups: the Joint Intercept Control Group 
(JICG), the Joint Processing Allocation Group (JPAG) and the Joint Liaison Group (JLG). 



HANDLE VTA TALENT KEYHOLE COMINT CONTROL BY3TEM0 JOINTLY 
NOT KELEASADLE TO FOREIGN NATIONALS 



11 



JOP SECRET UMBRA 



DOCID: 3188691 



The CJO agreement owed its existence to the two most influential sponsors, Joseph 
Wenger (who commanded OP-20-G) and Preston Corderman (chief, ASA) for the Army, 
and it was in those days referred to as the "Corderman-Wenger Agreement." But when the 
first CJO was appointed, it turned out to be Colonel Harold G. Hayes, a long-time Army 
COMlNTer and the new chief of ASA. 

The first task of the CJO was to allocate intercept tasks. This was not as easy as it 
appeared. Agreement was reached that counterpart targets were to be copied by the 
respective U.S. service cryptologic organization. All other targets, even those being 
intercepted entirely by a single service, were to be considered "joint." The CJO then 
reallocated the intercept responsibilities. This had the largest potential impact on the 
resources of the Navy, which during World War II, as previously discussed, completely 
gave up "joint" targets (with a few exceptions) to the Army. 

Intercept allocations really got down to priorities. With limited resources (and in 1946 
resources were constrained), the key to obtaining copy was in the priority system. In 
September of that year USCICC decided to hold monthly meetings to consider priority 
problems. By this process a standing priority list, in rather general terms, was 
established. The CJO then made intercept assignments to positions in the field. When the 
CJO assigned a joint case to a position it controlled (i.e., one which had been turned over by 
one of the Service Cryptologic Agencies, as they were then called) there was no problem. 
But occasionally the CJO assigned a joint target to a service-protected position. This 
invariably met with resistance, and the CJO had no enforcement authority. The Service 
Cryptologic Agencies (SCAs), for their part, insured that counterpart positions were 
manned with the best operators, that they were never left uncovered, and that technical 
data were always up to date. In short, if a target had to be slighted, it was likely to be the 
joint target. The servicemen never forgot whom they worked for. 

CJO also allocated processing tasks through the JPAG. Since people and equipment 
for processing were in very short supply, processing on each major target was to be done in 
only one place - either Arlington Hall or Nebraska Avenue - no matter which service 
collected the traffic. In those days communications systems were mutually exclusive 
rather than common and interlocking, and once traffic was intercepted by one service, it 
had to pass vertically through those communications channels all the way to Washington. 
This meant that there had to be communications between Nebraska Avenue and 
Arlington Hall so that the traffic could be exchanged, and under CJO a teleprinter link 
was set up. The services had a great deal of difficulty talking to each other (electrically, 
not to mention in person), and it was a real effort to establish common cryptographic gear 
for interoperability. In the late 1940s this process was just getting started. 

Communications security policy was, if possible, even more difficult to meld into a 
cohesive system than was COMINT. Through the war each service handled its own COMSEC 
matters with little reference to joint policy. In the Army, ASA was responsible for both 
COMINT and COMSEC, a development substantially influenced by such technicians as Frank 



HANDLE VIA TALENT KEYHOLE OOMIWT CONTROL 3YSTEM3 JOINTLY 
1 .NOT RELEASADLE TO FOREIGN NATIONALS 



-TJOMECRETUMtfRA 



12 



DOCID: 3188691 



■ rOF^CKLI U l 



RA 



Rowlett and William Friedman. In the Navy, COMSEC had begun within Captain Laurance 
Safford's embrace, but it had eventually become part of a separate organization under 
Naval Communications, called OP-20-K. 

After the war, COMSEC policy was allocated by an unregistered executive order to a 
Cryptographic Security Board consisting of the secretaries of state, war, and navy. This 
very high-level board quickly became moribund, and the real actor in COMSEC policy was 
the Joint Communications-Electronics Committee (JCEC) and its subordinate, the Joint' 
Security and Cryptographic Panel. When COMINT was unified in 1949 under the Armed 
Forces Security Agency (AFSA), COMSEC was still decentralized. 

The C JO was a compromise between those who wanted tight central control and those 
who wanted to continue a loose arrangement. It was voluntary, as had been all of its 
predecessors. It never resolved the conflict over joint targets, much to the dismay of the 
State Department, which was the principal customer for most of those targets. But the 
establishment of an executive organization was the first step in creating an organization 
to control COMINT. It didn't work, but it pointed the way toward the future. 

THE CRYPTOLOGIC ALLIES 

America's SIGINT relationship with Great Britain also dates to World War II. In July 
1940, the British ambassador to Washington, Lord Lothian, proposed that the two nations 
exchange information on, among other things, technological secrets related to "submarine 
detection and radio traffic." This appears to have pertained generally to SIGINT, but the 
wording of the now famous Lothian Letter did not really say precisely what he (or 
Churchill) meant. It also appears that day-to-day intelligence cooperation predated the 
Lothian Letter, for in April of the same year President Roosevelt met Churchill's special 
envoy William Stephenson to discuss a plan for secret cooperation between the FBI and 
British secret intelligence. According to a fascinating account in the somewhat unreliable 
book by William Stevenson (unrelated to the wartime William Stephenson), it was at that 
meeting that Stephenson informed Roosevelt of British progress in breaking the German 
ENIGMA system. (This might have happened but was quite out of character for the 
security-conscious British.) This meeting did, in fact, lead to the establishment of the 
British Security Coordination (BSC) in Washington, with Stephenson in charge. During 
its early days this organization dealt primarily in HUMINT and counterintelligence. 18 

The Lothian Letter was followed in August by a visit by Sir Henry Tizard, scientific 
advisor to the Royal Air Force (RAF). This inaugurated a series of technical discussions on 
a wide variety of subjects. Tizard, not a SIGINTer, was mainly interested in discussing 
radar and other such technical developments. At the same time, the United States sent to 
Britain a delegation consisting of Brigadier General George V. Strong (Chief of War 
Plans), Brigadier General Delos E mmons (United States Army Air Forces — 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL OYSTEMD JOINTLY 
NOT ItELEASADLE TO FOREIGN NATIONALD 



13 




DOCID: 3188691 



■ TOP SE C RE T U^RA 

USAAP), and Rear Admiral Robert Ghormley (Assistant Chief of Naval Operations). 
Though the discussions were to be general, it appears that Strong had, or thought he had, 
considerable latitude to discuss cryptologic intelligence. On 5 September he cabled 
Washington to propose a total exchange of information on SIGINT product and technical 
matters (i.e., cryptanalysis). Back in Washington there was a good bit of concern. The 
Navy said "No," while the Army vacillated. Their top cryptanalyst, William F. Friedman, 
was consulted. Friedman favored the exchange. 

So initial hesitance was eventually converted to approval, and on the day after 
Christmas 1940, the Army decided once and for all to initiate a complete cryptologic 
exchange with the British. In February 1941, Captain Abraham Sinkov and Lieutenant 
Leo Rosen of the Army's SIGINT organization, along with Lieutenant Robert Weeks and 
Ensign Prescott Currier of the Navy, sailed to London. They brought with them a PURPLE 
Analog, a machine the Army was using to break the keys for the Japanese diplomatic 
cipher system. They had instructions to initiate a complete exchange of cryptanalytic and 
SIGINT information. 19 

The British appear to have been flabbergasted. Never had they anticipated that the 
United States would simply walk in and plunk down their most secret cryptanalytic 
machine. This was, indeed, an intelligence exchange worth the money. But they were 
cautious. They did not tell the Army and Navy emissaries everything they were doing, 
and they did not show them the ENIGMA operation at first. Agreed upon in principal in 
1940, the complete exchange of cryptologic information and techniques progressed slowly 
through the war. Once again the Navy, reluctant in the beginning, produced the more 
beneficial exchange. This was due largely to historical circumstances. The Army was still 
mobilizing and clearly would not see action in Europe until at least late 1942, if not later. 
But the Navy was already engaging German U-boats in the North Atlantic. They and the 
British had worked out a convoy system, and daily cooperation in intelligence was 
essential to avoiding wolf packs. Thus it was that Commander Roger Winn, who headed 
the Operational Intelligence Center in the Admiralty, convinced the U.S. Navy that it 
must have something similar. Prompted by Winn, the U.S. Navy established the 
mysterious organization called F-21 (Atlantic Section, Combat Intelligence Division, U.S. 
Fleet) and its still more mysterious submarine tracking room. The latter used all sources 
of intelligence, including U-boat positions obtained by ENIGMA decrypts, passed to them by 
the British. 

The arrangement worked well at first, but in February 1942 the Germans introduced 
the four-rotor ENIGMA, and the British at Bletchley were unable to read it. The Americans 
were already suspicious because the British kept the cryptanalytic techniques so closely 
held. So in 1942 the Navy embarked on a project to break the ENIGMA themselves, in 
defiance of British protests. Colonel John Tiltman, a temporary GC&CS resident in 
Washington, finally convinced the British that the Navy would proceed with or without 
British help. In June 1942, after Tiltman's intervention, the Navy sent two expert 



■ HANDLE VIA TALENT KEYHOLE COMINT CONTROL OYQTEMQ JOINTLY 
NOT RELEA6ABLE TO FOREIGN NATIONALS 




14 



DOCID: 3188691 



- top sceRE r u ytfiRA 



cryptanalysts, Lieutenant R. B. Ely and Lieutenant Junior Grade Joseph Eachus, to 
Bletehley to learn all they could about ENIGMA processing. In September the Navy began a 
project to build a four-rotor ENIGMA processor (called a "bombe" by the British). When in 
the summer of 1943, the Navy moved to its new headquarters on Nebraska Avenue, a 
major portion of the space was reserved for the bombes, which were being employedto 
break the keys on German submarine ENIGMA traffic. In the end, the two nations drove the 
U-boats from the North Atlantic, based in part on information provided by the bombe 
project. 

Meanwhile, the Army was having its own problems on the SIGINT front. Increasingly 
suspicious of British reluctance to share cryptanalytic techniques, they retaliated by 
refusing to share information on voice ciphony equipment with Alan Turing. Since Turing 
was one of the top Bletehley scientists (and has been given credit for developing the first 
British bombe), this was a very serious breakdown in cooperation. It became the subject of 
a long series of exchanges between General George Marshall and Sir John Dill (chairman 
of the British Joint Chiefs of Staff), and at one point it seemed possible that the two sides 
might break COMINT relations. The dispute was resolved in 1943 when the British agreed 
to allow a total technical exchange. The agreement was hammered out during a series of 
sessions between Military Intelligence Service and Commander Sir Edward Travis, who 
headed GC&CS, during Travis's trip to Washington in May. The paper specified that the 
United States would be responsible for the COMINT problem in the Far East, while the 
British would worry about Europe. To implement this, it was agreed that the Americans 
would send a team of cryptologists to Bletehley to work side by side with the British in all 
aspects of COMINT, including cryptanalysis of the ENIGMA. That way the Americans would 
gain technical expertise on the system without mounting a competing cryptanalytic effort 
on the American side of the Atlantic. 

To begin the new relationship, the Army sent a three-man team consisting of Colonel 
Alfred McCormack, William Friedman, and Lieutenant Colonel Telford Taylor to 
Bletehley. By mutual agreement, Taylor was left behind in London to serve as a liaison 
officer and to act as a funnel for British COMINT being sent to the War Department in 
Washington. Taylor's job was not easy, as there was a good deal of second-guessing the 
British forthrightness in the exchange. But as the war progressed it became smoother and 
eventually became a very open exchange of highly sensitive information. 

With the Axis almost defeated, the thoughts of cryptologists in 1945 turned with 
increasing frequency to the Soviet Union. Both nations had maintained rudimentary 
efforts against the "Communist menace" since the 1920s, and they both kept small efforts 
even during the war. In June of 1945 ANCIB proposed to the British that they extend 
their wartime cooperation to the intercept and exploitation of their erstwhile but 
distrusted ally. They called the project BOURBON, and it was kept compartmented for the 
obvious reason that the Soviets were still officially on our side. The arrangement was 
largely informal and involved the exchange of liaison units on both sides of the Atlantic. 



■ HANDLE VIA TALENT KEYHOLE COMINT COMTItOL PYPTEMO JOINTLY 
NOT BELIE AS ABLE TO FOREIGN NATIONALS 

15 4 on Gcc ft g rutyr^RA 



DOCID: 3188691 



(b) (1) 

(b) [3)-50 USC 403 
(b) (31-18 USC 798 
(b) (3)-P,L. 86-36 



TOP.3ECRETU MBRA 



But in September, with the war officially over,%the U.S. had a legal problem. Could it 
now continue to collaborate with its British allies?^Clearly, the American cryptologists, 
good as they had become, still regarded GC&CS with i certain awe. In many cryptanalytic 
areas the British were still ahead of us, and their organization of the COMINT system was 
superb. And of course there was the problem of the SoViet Union. Already the wartime 
alliance had disintegrated. In September of 1945 both %e Army and Navy suggested to 
President Truman that collaboration with the British continue for the present "in view of 
the disturbed conditions of the world and the necessity of keeping informed of the technical 
developments and possible hostile intentions of foreign nations. . . ." In reply, Truman 
signed a brief, single-sentence note sent to him by the Joint Chiefs of Staff: 

The Secretary of War and the Secretary of the Navy are hereby authorjied to direct the Chief of 
Staff, U.S. Army, Commander-in-Chief, U.S. Fleet, and Chief of Navai\6perations to continue 
collaboration in the field of communication intelligence between the Uiited States Army and 
Navy and the British, and to extend, modify, or discontinue this collaboration, as determined to 
be in the best interests of the United States. 20 

Now that the American side was officially unleashed to collaborate with the British, it 
seemed necessary to write a bilateral agreement for the postwar yearsA. After months of 
meetings and conferences, the two sides sat down in March 1946 to sigh the British-U.S., 
or BRUSA, Agreement. The paper which charted the future course of bo|4 countries was 
only four pages long.. (The policy conference at which it was signed wa* followed by a 
technical con ference which wrote all the fine print appearing later as, annexes and 
appendices.) I " '■ \" 



With the signing of the BRUSA Agreement, the BOURBON l iaison offices on both sides 
of the Atlantic became representatives of STANCIB and LSIB, 



\ | The BOURBON officer, 

Commander Grant Manson, was invested with the rather cumbersome title of U.S. Liaison 
Officer, London SIGINT Centre (LSIC, as GC&CS was then known) - or USLO LSIC. He 
reported to STANCIB through the deputy coordinator for Liaison, part of the new CJO 
structure. In early 1946 the British moved LSIC from its wartime location at Bletchley to 
Eastcote, outside London, and began using a new title, Government Communications 
Headquarters, or GCHQ. Space for Manson was provided at Eastcote. The BOURBON 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL QYOTEMQ JOINTL' 
NOT RELEASABLE TO FOREIGN NATIONA feS— 



■ TOP SCCrtLT UMBRA 



16 



DQCID: 3188691 



liaison office had maintained an office in London, and Manson had to cover two locations, 
in Eastcote and London. (This situation continues to this day, with NSA holding offices in 
both London and Cheltenham.) USLO never controlled the TICOM group, which also 
found quarters at Eastcote. 21 

The British, meanwhile, had a more difficult problem. While the U.S. dealt with only 
one COMINT organization, GCHQ, the British had two - the Army at Arlington Hall 
Station and the Navy at Nebraska Avenue. Not wishing to choose, the British 
diplomatically located their liaison officer in the State Department building in downtown 
Washington. (They did, however, maintain a technical staff at Arlington Hall.) Their first 
liaison officer was Colonel Patrick Marr^Johnson, who had signed the BRUSA Agreement 
for the British side. When he retired in 1949, he was succeeded by Tiltman, who was 
already well known to the Americans and had served for a time as Travis's deputy at 
GC&CS. This began a practice, continued to this day, of assigning very senior cryptologic 
officials to the respective liaison offices, and the USLO eventually became SUSLO - Senior 
U.S. Liaison Officer. 22 

And where were the British Dominions in all this? They were mentioned in the 
BRUSA Agreement, and it was agreed that they would not be termed Third Parties, but 
they were not direct and immediate partners in 1946. Arrangements that Great Britain 
might make with them would be communicated to STANCIB. STANCIB, in turn, would 
make no arrangement with a Dominion without coordination with LSIB. Thus the now- 
famous UKUSA Agreement was not that at all; at least to begin with. It was a BRUSA 
Agreement. How it became the UKUSA Agreement was a development that spanned 
another eight years. 

Of the three dominions with which the Americans eventually associated, the 
relationship with Canada began first. Canadian-American SIGINT cooperation appears to 
have begun in 1940, in the form of service-to-service collaboration between the respective 
armies and navies. These decentralized arrangements were eventually overtaken by a 
centralized relationship centering on the Examination Unit of the National Research 
Council, established in 1941 as one of those clever cover terms denoting a Canadian SIGINT 
organization. Its purpose was to decodp traffic to and from the Vichy delegation in Ottawa. 
This unit's control was gradually broadened until it was the dominant force in Canadian 
cryptology. (It was the linear predecessor of the postwar organization Communications 
Branch, National Research Council [CBNRC] and its successor, Communications Security 
Establishment [CSE].) By 1943 it had its own submarine tracking room and was receiving 
plots from the British based on ENIGMA decrypts. When the British began cooperating 
with the U.S. in 1941, they requested that the U.S. bring the Examination Unit into the 
scope of the cooperation. But the Americans were leery. They knew that the Examination 
Unit had been established by Herbert 0. Yardley, the renegade American cryptologist who 
had published cryptologic secrets in 1931 in The American Black Chamber. The Signal 
Intelligence Service, which had been victimized by Yardley's revelations, informed the 



' HANDLE VIA TALENT KEYHOLE COMINT CONTROL BYOTEMfl JOINTLY 1 
NOT HELE ABADLE TO FOREIGN NATIONALS 

17 JOP^KKETU^RA 



DOCID: 3188691 

TOP SECRET UjyfBRA 



(b) (1) 

(b) (3) -50 USC 403 
(b) (3J-P.L. 86-36 
(b) (3)-lB USC 798 



British that they were willing to cooperate only if Yardley were let goA.The British, 
holding no brief for Yardley, had the Canadians get rid of him, and collaboration with the 
Americans flowered. By April of 1942 details of the Canadian-American cooperation were 
hammered out. Collaboration was particularly close in direction finding (DP) of German 
naval vessels. 



(b) (1) 



J But the United States was suspicious; Canada had just been through a major spy ' 



scandal, the Gouzenko affair (chapter 4), and USCIB wanted to go slow. Making matters 
worse was the head of the Canadian policy committee on COMINT, a rather prickly 
character -efused for several years to adopt some of the 

security procedures which the United States and Great Britain had agreed upon at the 
BRUSA Corjference^_Morepver, while the United States wanted a formal document on 



COMINT cooperation 

two countries finally agreed to exchanm 



lid-not^ ~ After several years of 



letters Between 
won the battle of 



very diff icult negotiations, the 



and USCIB chairman 

the legal documentation while 



Major General C. P. Cabell. Thus 
the United States got its way on security procedures. 23 

Furthest from the mainstream were the Australians. British-Australian COMINT 
collaboration appears to have begun, in the late 1930s when a small Australian 
cryptographic organization under the Director of Naval Intelligence began working with 
the British Par Eastern Combined Bureau (PECB) in Singapore. In early 1940 an 
Australian naval commander named T.E. Nave set up the nucleus of an Australian SIGINT 
group in Melbourne, which was the origin of the modern Australian SIGINT organization. 
Its most important organization was the Central Bureau, set up in April 1942 as a 
combined Australian-American COMINT group. When the Americans departed in 1945, 
the Australian remnant of Central Bureau became Defence Signals Bureau (DSB). 

The British were determined that DSB should enjoy the same status on BOURBON as 
the Canadian, and, immediately after the war, began including the Australians in their 
technical exchanges. But in 1947 this procedure became embroiled in a lengthy dispute 
over Australian security practices. The procedures in dispute were arcane, and the origins 
were almost as difficult to fathom, but both apparently originated with a spy scandal. 

In 1947 SIS succeeded in decrypting some KGB messages which had been sent more 
than a year earlier and which contained certain classified British military estimates. The 
messages came from the Soviet embassy in Canberra, and it was immediately assumed 
that an Australian was passing classified information. The British, alerted by the 
Americans, sent Sir Percy Sillitoe, chief of British Secret Service, to Australia to discuss 
this with the prime minister. Sir Percy was under instructions to conceal the origins of the 
information, and when the prime minister, a Laborite named Chifley, demanded proof, 
Sillitoe mumbled something rather lame about a possible mole. After considerable 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL OYOTBM0 JOINTLY 
"NOT ItELEASADLB TO FOREIGN NATIONALO 



- TOP SE C RET 



ru^RA 



18 



DOCID: 3188691 ' <?! jib ?S B 3 

(b) (31-P.L. 86-36 



JOMKRTfUI^BRA 



discussion, Chifley agreed to establish a new^ustralian security organization, called the 
Australian Security Intelligence OrganizatiokX 

With the Australian security house supposedly in order, the British prime minister, 
Clement Attlee, intervened with President Truman to get a new hearing of the Australian 
matter. Attlee complained in a letter to Truman that: 

The intermingling of American and British knowledge^, all these fields is so great that to be 
certain of denying American classified information to the Australians, we should have to deny 
them the greater part of our own reports. We should thus be placed in a disagreeable dilemma of 
having to choose between cutting off relations with the United States in defence questions or 
cutting off relations with Australia. 24 

With matters at the crisis level, Attlee proposed to Truman that Sir Francis Shedden, 
the powerful and respected Australian defense minister, visit the United States to plead 
the case. Truman accepted, and Shedden visited Washington in April. But he was unable 
to sway USCIB, and the British were back to their dilemma - Whether to choose the United 
States or the Commonwealth as allies. In 1949 the outcome was anything but certain. 

Then one of those unexpected quirks of fate intervened whicli was to save the day: the 
Labor government under Chifley went down to defeat at the polls.Xand Robert Menzies 
formed a new Liberal-Country Party coalition in December. Thij conservative Menzies 
was able to successfully disassociate his government from the leftiskeleinents of the Labor 
government. This was critical since the actual source of the leaks wa> knbwn (through the 
VENONA project; see chapter 4) to be two leftists within the Australian diplomatic corps. 
With a Conservative government in power, USCIB authorized a limited "resumption of 
cryptologic exchange with Australia. Full resumption of ties did not occur until 1953. The 
incident tarnished American-Australian intelligence cooperation for years and caused a 
serious rift with Britain which was made worse just a few years later with the Klaus Fuchs 
case and the Burgess and McClean defections. It also had a deleterious affect on early U.S. 
SIGINT efforts against the People's Republic of China (PRC). 25 \ 

By 1953 relations had warmed to the point where Australia was reincorporated as a 
full COMINT partner. The foundations of the Australian participation in the, UKUSA 
Agreement (the name BRUSA was changed at Britis h request a year later) came at\he 
Melbourne Tripartite Conference of September 1953 



New Zealand came inasa fifth partner,! f\New 



Zealand had contributed mainly DF to the Allied cryptologic effort in World War II \nd 
had sent people to Australia to serve with the Commonwealth effort in Brisbane, j 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL OYQTEMO JOINTLY 
NOT RBLEASABLE TO FOItEIQN NATIONALS 



19 



J2&je€reT0mbra 



(b) (1) 

(b) (3)-18 USC 798 

(b) (3J-E.L. 86-36 (b) (3) -50 USC 403 

(b) (3)-P.'L. 86-36 



Notes 



1. Ronald Lev/in, The American Magic: Codes, Ciphers, and the Defeat of Japan (New York: Farrar, Straus and 
Giroux,1982),24. 

2. Robert L. Benson, "A History of U.S. Communications Intelligence during World War II: Policy and 
Administration," manuscript pending CCH publication. Hereafter Benson "History." 

3. Ibid. 

4. Ibid. \ 

5. Ibid. 

6. George F . Howe, "The Narrative History of AFSA/NSA," part I, unpublished manuscript available in CCH. 
Hereafter Howe "Narrative." 

7. Ibid. \ 

8. USNSG, "U.S. Naval Communication Supplementary Activities in the Koreak Conflict, June 1950 - August 
1953," in CCH Series V.M.3.I.; BensonTHistory"; SRH 149, Records of the National Security Agency, Record 
Group 457, National Archives, Washington, D.C.; oral history interview with RADM Earl E. Stone, 9 Feb 1983, 
Carmel, California by Robert D. Farley, NSA OH 3-83. 

9. NSA retired records, CACL 60, TVC 1317; [Edward S. Wiley] On Watch: ProfUes from the National Security 
Agency's Past40 Years (Ft. Meade: NSA/CSS, 1986), 13. 

10. CCHSeriesVI.l.l.l.;X.H.7.5. 

11. Oral history interview with Dr. Abraham Sinkov, May 1979, by Arthur J. Zoebelein f" |p a le 
Marston, and Samuel Snyder, NSA OH 2-79; Howe, "Narrative." 

12. Oral history interview with Col. (USAF Ret.) John P. Shean, 18 April 1984, by Robert D. Farley, NSA OH 16- 
84; memo to Chief, AFSA-90, 14 Dec 1948, in CCH Series V.C.2.12. 

13. NSA/CSS Archives, ACC 26350, CBSK 32. 

14. Philip S. Meilinger.ifoytS. Vandenberg: The Life of a General (Bloomington, Ind.: University of Indiana 
Press, 1989). 

15. NSA/CSS Archives, ACC 26350, CBSK 32; oral history interview with Gordon W. Sommers, Hqs ESC, 
January 1990, by Millard R. EUerson and James E. Pierson; Richard R. Ferry, "A Special Historical Study of the 
Organizational Development of United States Air Force Security Service from 1948-1963," Hq USAFSS, 1963. 

16. "An Oral History Interview: The Electronic Security Command - Its Roots; Featuring the Founder of 
USAFSS/ESC, Lt. Gen. Richard P. Klocko (USAF, Ret)," Hqs ESC, 20 October 1989. 

17. The history of the CJO is covered in detail in Howe, "Narrative," and in Thomas L. Burns, The Origins of the 
National Security Agency, 1940-1952, United States Cryptologic History, Series V, Vol. I (Ft. Meade: CCH, 
1990). Hereafter Burns, Origins. 



DOCID: 3188691 



■ HANDLE VIA TALENT KEYHOLE COMINT CONTROL 3Y3TEM3 JOINTLY 

NOT RET.TM CjA RT V TO TiTmTTimT »T,t TmiLTH * e — 



■ JQP SC eWeTyM^RA 20 



DOCID: 3188691 



;/(b) (3J-P.L. 86-36 



JOP SCCnETTj ltfflfiA 

18. NSA/CSS Archives, ACC 16824, CBTB 26; Jeffrey 4. Richelson and Desmond Ball, The Ties that Bind 
(Boston: Allen and Unwin, 1985), 136-7. Hereafter Richelson, Ties. 

19. "A Chronology Df the Cooperation Between the SSA and the London Offices of GCCS," 2 June 1945, CCH 
Series Vl.V.7.2. In addition, the entire Army-British and Navy-British relationships during the war are covered 
in detail in Benson, "History." 

20> CCH Series V.A.29. The early collaboration with the British on the Soviet problem is covered in George P. 



Howe "^1 ("Historical Study of COMINT Production Under the Joint Operating Plan, 1946- 

1949," in CCH Series V.E.1.1., and in Michael Peterson, "Early BOURBON - 1946. The First Year of Allied 
Collaborative COMINT Effort against the Soviet Union," Cryptologic Quarterly (Spring 1994). 

21. See Howe, "Narrative"; Burns, Origins; Beiison, "History"; Peterson, "Early BOURBON"- and CCH Series 
VI.J.1.2. 

22. "Origins of the SUSLOs," in CCH Series &H.8. 

23. "Historical Summary of U.S.-Canadian/COMINT Relations," 12 April 1949, in CCH Series V.J.3.; NSA/CSS 
Archives, ACC 16824, CBTB 26; Riehelson j Ties; oral history interview with Frank B. Rowlett, various dates, by 
Henry F. Schorreck and | ft SA OH 14-81. See also Howe, Jvcrratfue, and Benson, "History." 



24. Copies of papers from the Harry S. Truman Presidential Library in Independence, Missouri, in CCH Series 



XVI. 



25. The early problems between the U.S. and Australia in COMINT cooperation is covered in Richelson, Ties; 
Howe, "Narrative"; Benson, "History"; copies of papers from the Dwight David Eisenhower Presidential Library 
in Abilene, Kansas, contained in CCH Series XVI. Specific information about the Australian spy scandal and its 
impact on COMINT collaboration is covered in Christopher Andrew, "The Growth of the Australian Intelligence 
Community and the Anglo-American Connection," Intelligence and National Security (April 1989), V. 4, # 2: 213- 
256; Robert Manne, The Petrov Affair: Politics and Espionage (Sydney: Pergamon, 1987); and Desmond Ball and 
David Horner, "To Catch a Spy: Signals Intelligence and Counter-espionage in Australia, 1944-1 949" (Canberra: 
Strategic and Defence Studies Centre, Australian National University, 1993), pending publication. 

26. Vincent Las Casas, NSA's Involvement in U.S. Foreign SIGINT Relationships through 1993, United States 
Cryptologic History, Series VI, Vol. 4 (Ft. Meade: CCH, 1995). 



■ HANDLE VIA TALENT KEYHOLE COMINT CONTROL OYDTEMD JOINTLY 



DOCID: 3188691 




Chapter 2 
AFSA and the Creation of NSA 



The formation of AFSA resulted from both technical and budgetary causes. The 
technical concerns were first surfaced within the Army Security Agency (ASA) over the 
conclusions of a study on World War II German SIGINT done by the Target Intelligence 
Committee (TICOM - see chapter 1). TICOM had studied the German failure to crack 
high-grade Allied codes and ciphers and concluded that it resulted from a badly 
fragmented effort. The Germans mounted at least five different cryptanalytic efforts. 
Each competed for resources and attention, and each jealously guarded its resources and 
techniques from outside encroachment. 1 

The result was failure. As Frank Rowlett, perhaps the leading ASA cryptanalyst in 
1948, said, "they all skimmed the cream off and they did the easy ones and nobody, none of 
them, were [sic] ever able to concentrate on the more important and more secure systems 
and bring them under control. " 



THE STONE BOARD 

The disastrous results of German cryptologic competition spurred Rowlett and his 
associates to press for unification of the American effort. In 1948, under the direction of 
Brigadier General Carter Clarke, Rowlett chaired a committee to write a paper proposing 
cryptologic unification. The committee included some of the leading names in subsequent 
American cryptology, including Herbert Conley, Benson Buffham and Gordon Sommers. 
Rowlett's concerns were mainly technical. With so many good cryptanalysts leaving the 
services, there was a greater need than ever to concentrate resources. Fragmentation 
would guarantee the same fate that had met the Germans. This technical argument had 
been supported in 1946 by the results of the Congressional Pearl Harbor Committee, 
which, as part of its final report, recommended cryptologic unification. 2 

Army secretary Kenneth Royall was persuaded to support unification, but at his level 
the concerns were mainly financial. Royall was concerned that the formation of the new 
U.S. Air Force Security Service (USAFSS or simply AFSS) would mean a smaller slice of 
the monetary pie for ASA. His report convinced Secretary of Defense James Forrestal, 
who in August of 1948 established a DoD-level committee to look into the matter of 
cryptologic unification. Although the committee contained members of the intelligence 
establishments of all three services, it became known as the Stone Board, after its 
chairman, Rear Admiral Earl E. Stone, the director of Naval Communications. 



HANDLE VIA TALENT KEYHOLE OOMIWT OOMTROL 3Y3TEMB JOINTLY 
NOT RF . T , TT ft S ft BI V TO FOItEIQN NATIOMAL3 



23 




DOCID: 3188691 




HANDLE VIA TALENT KEYHOLE CQMIIfT CONTROL GYSTEt i fg JOINTLY 
NOT RELBASABLE TO FOREIQN NATIONALO 




DOCID: 3188691 



The Stone Board was anything but harmonious. The Navy was dead set against 
unification, and Stone was the "chief arguer" (in his own words) against the concept. He 
got the Air Force behind him, and the result was a majority report arguing against the 
very concept it had been set up to consider. That report agreed to certain reforms in the 
current CJO (Chief of Joint Operations; see chapter 1) set-up, but refused to endorse any 
sort of thoroughgoing restructuring. The Army report favored cryptologic unification 
under a single agency, but it was only a minority report. The two documents were sent to 
Forrestal. Since the majority report favored a sit-tight approach, nothing happened, and 
the results of the Stone Board languished in a desk drawer until after the death of 
Forrestal in March of 1949. 3 

It is important to understand what was going on at that time. The interservice rivalry 
which had characterized American conduct of World War II had led to calls for service 
unification. The first step toward a reform of the U.S. military structure was the National 
Security Act of 1947, which established the Secretary of Defense, the National Security 
Council, and the CIA. Although all three institutions have become very powerful, in the 
early years they were not, and gaining control of their respective domains was a process 
marked by fierce rivalry and bitter infighting. 4 

The new secretary of defense, 
Louis P. Johnson, arrived at the 
Pentagon during the worst of these 
interservice clashes. Cryptologic 
unification was one of the most hotly 
contested issues. The protagonists did 
not leave him alone very long. Carter 
Clarke pushed Johnson hard on the 
issue. According to Clarke's own 
description, he approached one of 
Johnson's top aides, General Alfred 
Gruenther, to resurrect the Stone 
Board documents. Clarke argued that 
lack of unification was partly 
responsible for the failure at Pearl 
Harbor. Johnson, apparently 
impressed by this, called in General 
Joseph T. McNarney, a known 
supporter of unification. McNarney 
wrote a report which recommended 

creation of a central organization, Louis A. Johnson, 

called the Armed Forces Security secretary of defense In 1949 




HANDLE VIA TALENT KEYHOLE COMINT CONTROL SYSTEMS JOINTLY 
NOT BELEASABLE TO FOREIGN NATIONALS 




DOCID: 3188691 



BRA 



(b) (1) 

(b) (3J-P.L. 86-36 
(b) (3) -50 USC 403 
(b) (3) -18 USC 198 



Agency, but which retained the separate cryptologic organizations of the three services. 
The report was then discussed at a JCS meeting on 18 May 1949. At this meeting the Air 
Force chief of staff, General Hoyt S. Vandenberg, changed the Air Force vote to pro- 
unification. The minority had suddenly become the majority, and it was clear that 
unification was to be forced through. The Navy quickly reversed its vote, too, and the 
decision to create AFSA was unanimous. 

Why did Vandenberg change the Air 
Force vote? He may have seen the creation 
of AFSA as an essential ingredient in 
better intelligence, but he may also have 
felt that he could keep the fledgling USAF 
Security Service effectively independent. 
Vandenberg's central concern in those days 
was to establish a strategic strike force 
(Strategic Air Command, or SAC) which 
would be supported by an all-Air Force 
intelligence center. He regarded SIGINT as 
the key ingredient in such a creation and 
wanted to place a SIGINT analysis center 
within USAFSS which would be beyond 
the control of AFSA. It is possible that he 
changed the Air Force vote after 
assurances that, USAFSS would be 
permitted to establish such a center. (This 
center, called the Air Force Special 
Communications Center,, was actually 
created, and it resided at Kelly Air Force 
Base, home of USAFSS, fo r many 
years.) The later creation of the 



lis" 




Hoyt S. Vandenberg 
Provided the "swing vote" 
that created AFSA 



__]a device to keep intercept facilities independent of AFSA, might also 

have been part of such a plan. Vandenberg's thinking was probably also influenced by 
log-rolling in other areas, and may have represented an attempt to obtain Army support 
for other Air Force programs by yielding on the cryptologic issue. 5 



AFSA 

And so the Armed Forces Security Agency was created on 20 May 1949. It was 
promulgated by JCS directive 2010. AFSA was thoroughly military, and, because it 
answered to the JCS, its central concerns were all military. Organizations outside the JCS 
got short shrift in the collection of intelligence. State Department and CIA were intensely 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SYSTEMS JOINTLY 
NOT RELEASABLE TO FOREIGN NATIONAL0 



26 



DOCID: 3188691 



unhappy with this development, but they lacked the power to wrench AFSA out of the 
military chain of command. 

AFSA began life in borrowed quarters. Its people, just over 5,000 in the beginning, 
occupied spaces in Arlington Hall and the Naval Security Station on Nebraska Avenue,' 
sharing space with the Army Security Agency and Naval Security Group from which the 
space was obtained. Admiral Stone decided that the Naval Security Station would be used 
by AFSA for COMSEC, while the COMINT mission would be done at Arlington Hall. This 
decision began a historic physical separation between SIGINT and COMSEC which has never 
been completely bridged, despite the later move to Fort Meade. It was logical, though. 
Naval Security Group (NSG; formerly OP-20-G) was strong in the COMSEC discipline. 
Moreover, the Naval Security Station (NSS) at Nebraska Avenue had only about one- 
fourth the space available that Arlington Hall did, and this disparity in size meant that 
NSS was about the right size for COMSEC, while the larger spaces at Arlington Hall would 
be ideal for COMINT. There was a certain amount of shuffling back and forth as COMINTers 
from NSS moved their desks to Arlington Hall and COMSEC people from Arlington Hall 
transferred to NSS. But when it was finished, all the COMSEC people were housed in 
almost 214,000 square feet of office space at NSS, while the COMINT operations were lodged 
in 360,000 square feet at Arlington Hall. Including administrative, storage and machine 
space, there were only 79 square feet per worker at the Hall, but about 98 square feet at 
NSS. 

Workers often sat at tables rather than desks, in large warehouse-like rooms, cheek- 
by-jowl, as they worked complex code or callsign systems. Floors were tiled and the noise 
level was high. There was practically no air conditioning, and in the summertime it was 
common to close down for the day when the ratio of temperature to humidity got too high. 

AFSA owned two other facilities. The cryptologic school, a rudimentary training 
ground used originally to keep newly hired workers busy before their clearances came 
through (see p. 71), reposed in a structure on U Street Northwest in the District of 
Columbia. The Agency also maintained a courier facility at National Airport, then called 
Congressional Airport. 6 

The impact of AFSA on the services was immediate and severe. Besides turning over 
more than 600,000 square feet of space to the new organization, the Army and Navy had to 
donate about 80 percent of their existing Washington-area billets - 79 percent for ASA and 
86 percent for NSG. Although ASA kept many of its uniformed service people, its corps of 
over 2,500 civilian experts was turned over to AFSA virtually intact. This made the 
Service Cryptologic Agencies little more than collection organizations, with practically no 
central processing - all arms and legs, but no body. This revolution was accomplished 
virtually overnight with only minimal dissension and was AFSA's most noteworthy 
success. 



handle via talent keyhole comint oontrol syqtemo joiotly 
not releasadle to foreign nationalg 




DOCID: 3188691 





Analytic section, 
Arlington Hall Station 



The sole exception to this trend was USAFSS. The Air Force cryptologic agency 
practically seceded, opening its first headquarters at Brooks AFB, Texas, 1,600 miles away 
from the menace of centralization. Even more startling, it was required to donate only 
thirty officers, twenty civilians, and eighty enlisted billets to AFSA. So when USAFSS 
opened its processing center, it had plenty of billets to do it with. If this was what 
Vandenberg had in mind, it was working. 7 

AFSA organization reflected service competition. The director was to be chosen from 
among the three services on a rotating basis, and its first director was its most ardent 
opponent, Earl Stone. Assisting him were three deputy directors, one for each service 
Below them were four major divisions, which have survived to this day - Operations 



HAMDLE VIA TALENT KEYHOLE OOMIHT OOHTROLi OYDTEMO JOINTLY 
NOT RBIEASABLE TO FOREIGN NATIONALO 




DOCID: 3188691 



J(b) (1) 

§Q>) (3)-50 USC 403 
i\ (b) (3J-P.L. 86-36 



jSJ&secffETujytiRA 

Research and Development, CGMSEC, and Administration. The office designator system 
was numerical, so that Operations was AFSA 02, R&D was 03, COMSEC was 04, and 
Administration was 05/ Each of the military deputy directors also had a sphere of 
influence. The Navy ,d#ujy director, CaptaiM\loseph Wenger, controlled comint, while 
the Army deputy, pbjonej Samuel |P. CollinsW$upervised COMSEC, and the Air Force 
deputy, Colonel Roy ^ynri, handled administratiyb matters. 8 

The field collection effort/consisted of the Stitercept sites which had survived the 
budget cuts after/ World War ; I I. Army SecurijyU gency^had seven sites: V int Hill, 
Virginia; Petaluma. California: |~1 \\]Helemario, Hawaii; 



iFairbanks. Alaska: and Clark AFB in the Philippines. The Navy had twelve: 
j\dak, Alaska; 



Dupont, South Carolina; 



JSkaggs Island, California; Cheltenham, Maryland; 



1952 ASA had seven mobile units, while the Navy had three. 

AFSA's lack of tasking authority over Air Force positions was intolerable, and late in 
1950 Major General C. P. Cabell, Air Force director of intelligence, and Rear Admiral 
Stone signed an agreement granting AFSA the authority to task automatic Morse and 
radioprinter positions, while USAFSS retained control over voice. The Morse positions 



The Air Force had ten mobile units, whose status and location were somewhat vague. 
Finally, ASA had six SHAMROCK units, whose task was to screen commercial cable 
messages turned over to ASA by the cable companies under an arrangement which had 
existed since World War II. 9 

Field intercept was the rock that sank AFSA. In theory all the intercept positions 
were to be under AFSA control. In fact, some were not. Of the 763 intercept positions 
existing at the time AFSA was dissolved, 671, including all the Army positions, were 
under some form of AFSA control. Just over 100 were reserved by the Navy for fleet 
support and were thus completely beyond AFSA tasking authority. But even the positions 
under AFSA control could be tasked only by treading a complex paper mill by which 
tasking was routed through the SCAs, rather than being levied directly. This was true 
especially in the Navy and Air Force - the Army was more accommodating and permitted 
some form of direct tasking. 

Completely beyond AFSA purview, however, were the mobile intercept stations. In 
theory, these were small mobile efforts for direct tactical support. But AFSS flouted AFSA 
control by simply designating all their stations as "mobile." Thus even th e most 
permanent and sedentary station was designated as a "radio group mobile" or a\ / 



J( beyond AFSA control. The Army and Navy quickly caught on, and by 



<b) (1) 

(b) (3)-50 USC 403 
(b) (3)-P.L. 86-36 



HANDLE VIA TALENT KEYHOLE OOMINT CONTROL 0V0TEM0 JOINTLY 
NOT RELEAGADLE TO FQREION NATIONALS 



29 



_JCOMeCRETIjMflRA 



DOCID: 3188691 /<*!&-*.:.. ^ 



JOP^ecRETuiyiBRA 



i (b) (3) -50 USC 403 
1 (b) (3)-18 USC 798 



were split 50/50. Still later, in 1951, this arrangement was changed when the new director 
of AFSA, Lieutenant General Canine, and Colonel Lynn of USAFSS signed an agreement 
dividing the Air Force positions down the middle, regardless of modi of intercept. 

Meanwhile, USAFSS established its headquarters in San AnWl - first at Brooks 
AFB and later at nearby Kelly AFB, on a low rise west of the runway w^iich is now known 
as Security Hill. Within its headquarters it proceeded to establish aj Stateside COMINT 
processing center, Air Force Special Communications Center (AFSCCJ). This was done 
despite direct orders by Canine that it not be estab lished. Af SA abo directed that 
USAFSS not establish third-echelon processing on the I I target! but USAFSS did 

it anyway. Air Force defiance fragmented the processing effort and ha d much to d o with 
the demise of AFSA. Despite this, AFSCC continued to process on the | [ target 



until the late 1960s, when it was finally turned into an electronic warfare center. 10 

Service rivalry led to duplication. During the early days of the Korean War, for 
instance, both ASA and USAFSS covered the Soviet and Chinese air problems in the 
Korean area, and ASA did not discontinue its coverage until March of 1952, after many 
months of AFSA mediation. Likewise in the DF area, AFSA was unable to force a common 
DF net control for the Korean problem for more than a year. Ultimately the Navy kept its 
DF system separate. All three SCAs established second-echelon processing centers in the 
Pacific with or without AFSA blessing. Without firm control of SIGiNT, there was simply 
no way to organize effectively. This lack of control attracted unfavorable reviews from the 
generals trying to fight the Korean War and played a part in the COMINT reorganisation of 
1952." 

The final blow to AFSA was the development of a policy mechanism outside of AFSA 
itself. It was called the Armed Forces Security Advisory Committee (AFSAC), and it was 
created by the same JCS directive that established AFSA. The original plan was for an 
advisory committee composed of nine members - three from each service - chaired by the 
director of AFSA. But the JCS gradually changed AFSAC's charter from advisory to 
directive. Had AFSAC possessed a proper decision-making mechanism, the conversion of 
its role to that of direction might have worked after a fashion. But the rules required 
unanimity on all substantive matters. 12 AFSAC was immediately immobilized by 
interservice disputes and was ineffective from the start. AFSA had become a body with no 
head. 



■I IAJTOLE VIA TALENT KEYHOLE COMINT CONTROL SY8TEM3 JOINTLY 
NOTRffl BASABLB TO FOnEIQN NATIONALS 



Tge^ecfffr umbra 30 



DOCID: 



3188691 




DOCID: 3188691 

jbmkrEtijMbra 



/(b) (1) 

/ [b) (3J-P.L. B6-36 
' (b) (3) -50 USC 403 
(b) (3)-lB USC 79B 



One small success during these early years was the development of customer liaison 
organizations. By 1949 both the Army G2 and the Office of Naval Intelligence had 
established informal liaison offices with their cryptologi? counterparts at Arlington Hall 
and NSS. When AFSA was established, these arrangements continued undisturbed. Both 
the Army and Navy groups developed a very close relationship with AFSA, and their 
people often worked in an intelligence production role./ By the end of the Korean War, the 
Army organization, which called itself SRB (Special Research Branch), had some fifty 
people. Air Force Intelligence had a similar ground which was gradually subsumed by 
AFSS into a large organization of over sixty people performing both a customer (for Air 
Force Intelligence) and producer (for AFSS) role. Thus the Air Force group performed both 
as a producer and consumer, while the Army and Navy acted only as producers. 

Both CIA and State maintained small offices within AFSA, under a USCIB edict of 
1948. Although AFSA regulations permitted them to see semiprocessed intelligence, they 
never participated in the production process, Maintaining their offices for liaison purposes 
only. FBI's refusal to establish any office ; at all reflected J. Edgar Hoover's adamant 
opposition to COMINT centralization. 13 

While COMINT was fractious, COMSEC/was relatively serene. During World War II 
there had been a single authority for joint service communications matters, the U.S. Joint 
Communications Board, established in July of 1942. Its principal members were the chiefs 
of communications for the Army, Navy, and Air Force. In 1948 it gave way to a new 
organization, the Joint Communications-Electronics Committee (JCEC), which reigned 
supreme in this area for many years thereafter. The JCEC was concerned with 
communications planning, standards, and interoperability, but its charter by implication 
gave it a deterniining voice in COMSEC policy as well. 

When AFSA was created, JCEC effectively transferred central COMSEC functions to it. 
The charter did not extend to non-JCS organizations, but the State Department and other 
civilian agencies with communications security concerns had for years relied on the Army 
and Navy for COMSEC support;/ and this reliance was transferred to AFSA. AFSA began 
producing codes and ciphers for all the armed services and many of the non-DoD agencies. 
In addition, it undertook centralized COMSEC R&D functions, planning and programming, 
setting of security standards, and technical supervision of the communications security 
activities of the armed services. The SCAs retained many residual functions, such as 
distribution of AFSA-produced codes, security monitoring of transmissions, and the like." 

While AFSA successfully controlled the highly technical function of COMSEC, it was 
never able to control COMINT. This lack of control made powerful enemies. The State 
Department was up set because, under AFSA, the number of positions allocated to 
Jactually declined in the three years of AFSA existence, from 64 to 51, 



and from almost 17 percent of the total to only 6.5 percent. 



HANDLE VIA TALENT KEYHOLE COMMIT CONTROL 3Y3TEM3 JOINTLY 
NOTRF.T.RA^ APT TT TnirnnTriniT n - 



TQE-SECffET UMBRA 32 



tb) (1) 

(b)-(3)-50 USC 403 
(b) (3j.-18 USC 799 
(b) (3HE.L. 86-36 

. Tnt>irr;nrTUM[»w 



THE BROWNELL COMMITTEE 

The entire intelligence community was concerned over performance of the COMINT 
system in Korea. AFSA had not predicted the outbreak of war. A watch committee 
established under the wing of CIA in early 1950 listed Korea fifth on the list of world 
trouble spots, but this was not translated int o action, and when the war began AFSA still 
had no positions allocated to Korean military. 

^ : 

AFSA had no more dangerous opponent 
than Walter Bedell Smith, director of Central 
Intelligence. In 1950 the wartime feud 
between the COMINT empire and Smith's 
HUMINT organization boiled over. On 10 
December of that year Smith wrote a 
memorandum recommending that a 
committee be established to "survey" COMINT. 
Smith was "gravely concerned as to the 
security and effectiveness with which 
Communications Intelligence activities . . . 
are being conducted." He pointed to "the 
system of divided authorities and multiple 
responsibilities" which was endangering 
national security. The National Security 
Council in turn forwarded the 
recommendation to President Truman, who 
directed that a committee be formed. 

Walter Bedell Smith TheJCScould not take heart from the 

Director of Central Intelligence composition of the comittee. Its chairman 

was George A. Brownell, a New York lawyer 
and layman in intelligence matters. The members were Charles Bohlen, a prominent 
State Department official; William H. Jackson, special assistant to the DCI; and Brigadier 
General John Magruder, special assistant to the secretary of defense. Thus the Joint 
Chiefs, who owned the COMINT organizations, had no one on the committee. It was 
composed of "enemies," representatives from State and CIA - the two most vocal opponents 
of the existing system. 



DOCID: 3188691 




HANDLE VIA TALENT KEYHOLECOMirSI^ JOINTLY 
N0T£ELBA8#CBCET0F0BEIGN nationals 



33 



topsesbewjmbrtT" 



DOCID: 3188691 

mm 




!(b)(3)-50 USC 
1403 

l(b)(3)-P.L. 86-36 

(b)(3)-18USC 

798 



George A. Brownell 

The Brownell Committee held fourteen days of formal sessions, which were backed lip 
by many days of research and data-gathering. Its report was a scathing indictment of the 
old ways of doing business. Its bottom line stated bluntly that j 



, \ The added difficulty of the problem under attack places j 

a greater premium than ever on the quantity and quality of the physical and intellectual ) 
resources available, and on the efficiency and clarity of the organization charged with the task. j 
While much has recently been done to provide adequate physical resources for the job, the \ 
Committee is convinced that the present organization of our COMINT activities seriously i . 
impedes the efficiency of the operation, and prevents us from attracting and retaining as much 
top quality scientific management manpower as this country ought to be investing in so i 
important a field. It is highly significant t o the Committee that the return of many of the best 
wartime COMINT brains to more attractive " j 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SYSTEM!] JOINTLY 
NOTRELE-AgA^j^TnB-nrirTmnT.mTiM irn 



TOPSEeifEt UMBRA 34 



DOCID: 3188691 



The committee concluded that the creation of AFSA, coinciding as it had with the 
creation of USAFSS, had resulted in four COMINT agencies where there had formerly been 
two. It criticized AFSAC for obstructionism and requested that it be abolished. It attacked 
USAFSS as a virtually autonomous organization not operating under joint control at all. 

The positive recommendations of the Brownell Committee are worth studying, 
because they encompass the present-day structure of SIGINT in the United States. AFSA 
should be greatly strengthened, especially in its ability to control tasking at SCA 
collection sites. AFSA or its successor should be removed from JCS control and should be 
placed under USCIB, whose membership should be revised, and whose procedures should 
be governed by a vote of four, rather than unanimity, as had been the case with AFSAC. 
AFSA should centralize and consolidate processing operations wherever possible to 
increase the resources brought to bear on intractable cryptanalytic problems. The director 
should be upgraded to three-star rank, and should be appointed by the president to a four- 
year term. He should have a civilian deputy. Civilian career development should be 
encouraged to a much greater extent than formerly. 

The next several months were spent putting the Brownell report into directive 
language. The result was the Truman Memorandum, issued on 24 October 1952. This 
memo directed a complete restructuring of COMINT along the lines that Brownell 
recommended. It resolved an on-going dispute about how to change AFSA by abolishing it 
and creating in its place a new organization called NSA. Its director would work for the 
secretary of defense, who would become the "executive agent" for COMINT for the entire 
government. On the same date the National Security Council issued a revised NSCID 9, 
almost a verbatim quote of the Truman Memorandum. Both documents were classified 
Top Secret, thus hiding the official creation of NSA from the American public for many 
years. 

All that remained was for the secretary of defense to issue a memorandum 
establishing the new agency. He did so on 4 November the day that Dwight Eisenhower 
defeated Adlai Stevenson for the presidency. The creation of NSA was one of the last 
historical legacies of twenty years of Democratic governance. 

The Truman Memorandum, on the advice of Lieutenant General Canine, had excluded 
COMSEC. Despite his belief that NSA should have both a COMINT and a COMSEC role, 
Canine recommended against mixing both in the same document. Lovett's memorandum 
on 4 November did mention that NSA would inherit the COMSEC functions formerly 
performed by AFSA. A memo in December spelled out those functions in more detail, and 
this marked NSA's first formal COMSEC charter. 11 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL PYOTEMO JOINTLY 
NOT RET i FT /VSABLE TO FOREIGN NATIONALS 

35 TO£56eft£TU^RA 



DOCID: 



3188691 

TOP SECRET UM BRA 



KOREA 



It has become apparent . . . that during the between-wars interim we have lost, through neglect, 
disinterest and possibly jealousy, much of the effectiveness in intelligence work that we acquired 
so painfully in World War II. Today, our intelligence operations in Korea have not yet 
approached the standards that we reached in the final year of the last war. 

General A. James Van Fleet, Commanding General 8th Army, June 1952 



The Country 

American intelligence interest and attention, so painfully refocused on the Soviet 
threat after World War II, were not to be rewarded. The next war occurred not in Europe, 
where allies and commitments were, but in Korea, a remote Asian peninsula whose name 
many Americans had never heard in 1950. 

Korea had, throughout its recorded history, been a battleground between China, 
Japan, and Russia. Frequently invaded and occupied, its primary purpose seemed to be as 
a strategic buffer among three conflicting imperial ambitions. The most recent change of 
ownership had come after the Russo-Japanese War of 1904-05. Russia, the loser, was 
forced to cede its influence. Korea became forcibly Japanese. 

The Allied powers recognized during World War II that Korea was one of those 
geopolitical oddities whose status had to be resolved. It obviously could not remain 
Japanese, and so at the Cairo Conference of 1943 Roosevelt endorsed a policy that would 
ensure a "free and independent Korea." At Yalta in April of 1945, the Big Three (the 
United States, the USSR, and Britain) agreed to an Allied trusteeship, to be administered 
by the three plus China. 

Nothing further happened until the USSR declared war on Japan on 8 August 1945, 
simultaneously invading Manchuria and Korea. The sudden movement of Soviet troops 
onto the peninsula appeared to portend Soviet occupation, and MacArthur was directed to 
rush troops to the southern end of Korea. The United States proposed a division of 
military occupation on the 38th Parallel, splitting the peninsula roughly in half. Moscow 
unexpectedly agreed, and still more unexpectedly, complied. 

American forces dwindled down to about 30,000 by 1948. In March of that year 
President Harry Truman/following the country's mood of dedicated military budget- 
cutting, decided that America would simply have to abandon Korea to the United Nations, 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 3T3TEM3 JOINTLY 
NOT RELEASABLE TO FOREIGN NATIONAL3 - 

TO P acau .1 UM BRA 36 



DOCID: 3188691 



TOP SECRET UMBKA 



CHINA 




MANCHURIA 



SlNAXftr 



NORTH KOREA 



JNCIKJ** . %£Qii 



TAEK 



SOUTH KOREA 



FAKGL 



JAPAN 



Korea, 1950 



HANDLE VIA TALENT KEYHOLE COMINT OOffTROL 3Y3TEM3 JOINTLY 
MOT RELKASADLE TO FOREIGN NATIONAL3 



37 



TOP SECRET UMB RA 



DOCID: 



3188691 



"I UP !>LLKL I UWIMA- 



to sink or swim on its own. He decided to end the American trusteeship and sponsor free 
elections. So in the spring of 1948 American forces marched out of Korea. The South 
boycotted the elections, which led to a new National Assembly and a government headed 
by Syngman Rhee, a seventy-three-year-old militant anti-Communist who had spent forty 
years in exile in the United States waiting for the liberation of his homeland. The North 
formed its own government, the Democratic People's Republic of Korea (DPRK), headed by 
a young thirty-six-year-old Communist named Kim Il-sung. The peninsula was divided at 
the waist. 




Syngman Rhee Rim Il-sung 



The Asia Dilemma 

In 1949 catastrophe struck in the Far East. The corrupt and despotic Chiang Kai-shek 
and his Nationalists were ousted by the Communist forces of Mao Tse-tung. As the 
Communists marched into Beijing, Chiang fled to the island of Formosa (Taiwan), some 
100 miles off the coast, followed by as much of his army as could flee with him. By the end 
of the year, Mao was making confident proclamations about his intent to invade Formosa 
and drive Chiang and his army into the sea. 

In Washington, the administration was convulsed over whether the United States 
should support Chiang and the Nationalists. In the end the anti-Chiang faction won, and 
Truman, on 5 January 1950, issued a public statement that the United States had adopted 
a "hands off Formosa" policy. Ambiguity about which side of the line Korea stood on was 



HANDLE VIA TALENT KEYHOLE OOMINT CONTROL 3Y3TEMS JOINTLY 
NOT Kfl LiUbAHLii, 10 J? UHMUW NATIONALS 



IU MB.HU UMB RA 



38 



(b) (1) 

,.. _ „ ^ ^ (b) (3)-50 USC 403 

DOCID: 3188691 ^ui-p-i. »h» 



T OP SECRET U MBRA 

resolved a week later when Secretary W State Dean Acheson, at a press conference, 
described an American sphere of interest^ the Pacific that implicitly excluded Korea. 

By June 1950 the United States had boxed itself into a very weak position in Korea. 
From a full army corps, it was reduced to k 500-man Korean Military Aid Group (KMAG). 
The U.S. had left behind plans and equipment for a 50,000-man ROK (Republic of Korea) 
"constabulary" (rather than a real army) b\it devoid of heavy equipment, as the U.S. was 
afraid that the militant Rhee would use it to invade the North. Rhee drew up plans for a 
real army of 100,000, and he succeeded in extracting additional American commitments of 
weapons (but still no heavy, mobile offensive weapons). On the other side of the 38th 
Parallel stood a DPRK army and air force of\about 135,000 men, equipped by the Soviets 
with much of the heavy equipment that the Americans had denied to Rhee. 

American military forces, overall, in 1950 \were in a weakened state. Defense budgets 
had continued to decline from their World Wir II peak, and the defense budget for 1950 
was only $12.3 billion, with an authorized AVmy strength of 630,000 (but an actual 
strength of only 591,000). Of these, only 108,500 were in the Far East, almost all of them 
in Japan. In line with administration policy, thb Pentagon had no plans to defend Korea 
and no one there to do it. The American contingency plan for the peninsula was basically 
to evacuate all dependents to Japan. 18 \ 

Parallel to the national lack of interest in KoVea was AFSA's neglect of the problem. 
There were no documented high-priority national intelligence requirements on Korea, and 
the only requirement that related at all was couched in terms of keeping track of Soviet 
interest in the peninsula. At the time AFSA had "ho person or group of persons working 
on a North Korean problem. " During the previous jlear, SCA intercept sites had stumbled 
onto som ej J North Korean message^ which were originally collected as 
suspectedl IWhen in Mav 1949 thpso messages were identified as North 
Korea^ two intercept positions at| l and a tactical unit not under AFSA 



(b) (1) 

(b) (3)-50 USC 403 
(b) (3)-P.L. 86-36 
(b) (3J-1S USC 79S 



conteoi, were tasked with follow-up copy. AFSA had no Korean linguists, no Korean 
dictionaries, no traffic analytic aids, and no Korean typewriters. 19 

/ No one really expected an invasion in Korea. There was fragmentary humint 
i reporting, generally disbelieved by all, that there could be an invasion by North Korea in 
1950. In March an Army organization called the Intelligence Indications Steering 
Committee cited the possibility of military activity in Korea sometime in 1950. But this 
was set against a general disbelief in the intelligence community that Korea presented a 
real problem. 

After the war broke out, there was the usual scramble by intelligence agencies to find 
the indicators that had been missed. AFSA, for instance, discovered traffic indicating that 
there had been large shipments of medical supplies going from the USSR to Korea 
beginning in February. A Soviet naval DF net in the Vladivostok area had undergone a 



HANDLE V IA TALENT KEYHOLE OOMINT CONTROL 3Y3TEM3 JOINTLY 
NOT RELEAijAUm TO E' OKEltiN NAT1UNALS 



39 



TOP SECRET UMBRA 



DOCID: 3188691 



TOPSCCnCTUMDRA 

dramatic switch to South Korean DF tasks beginning in February. 20 This did not quiet the 
critics. 

The Invasion 

About 0330 on Sunday morning, 25 June 1950, Captain Joseph Darrigo, a KMAG 
military advisor to the ROK posted near Kaesong, was jarred awake by the roar of 
artillery. Darrigo, the only American on the 38th Parallel, was in the middle of an 
invasion of North Korean ground forces into South Korea. He managed to make it to the 
ROK 1st Division headquarters at Munsan just ahead of the advancing North Korean 
forces, and he spread the alarm. 

There appears to have been no tactical intelligence warning. A reporter in Seoul got 
word of an invasion and rushed to the American embassy for confirmation. At the same 
time that he got off a wire to New York, the American ambassador was cabling 
Washington. His cable had to be encrypted and decrypted, and it got there late. The 
Americans learned of the invasion from the reporter in Seoul. 21 

ASA decided to support the fighting with a communications reconnaisance battalion 
at Army level and three battalions to serve each of the three corps. The 60th Signal 
Service Company at Fort Lewis, Washington, appeared to be closest to being ready for 
deployment of any ASA tactical asset, so that organization was selected. But it took time 
to get ready, and in the meantime ASA Pacific (ASAPAC) in Hawaii rushed a signal 
collection unit to the Korean peninsula, arriving there on 18 September. The Fort Lewis 
unit did not arrive until 9 October. 22 

Meanwhile, the Truman administration had decided to help the fledgling ROK army 
and got UN backing for the deployment of a multinational defensive force to Korea. 
Truman directed MacArthur to rush the 8th Army from Japan to Korea, and the first 
American troops reentered Korea by air on 1 July. But it took time to get enough troops 
into the country, and the DPRK army charged ahead, pushing ROK defensive units ahead 
of it pell-mell. By mid-August, ROK defenders had been shoved into a perimeter around 
the port city of Pusan, the last remaining large city still under the control of the Rhee 
government. When the first ASA unit arrived in September, the ROK army, bolstered by 
newly arrived American divisions (the 24th Infantry, 25th Infantry and 1st Cavalry), was 
desperately hanging onto this slice of the Korean landmass, and the American and Korean 
defenders were in the middle of a fierce struggle to retain the town of Taegu. 23 

ASA's primary concern was to get linguists. Perhaps the only two first-rate Army 
Korean linguists were Y.P. Kim and Richard Chun, who were both instructors at the 
Army Language School in Monterey in 1950. Chun had been cleared in World War II, but 
Kim had never been in the COMINT business. ASA needed linguists at Monterey to train 
what was expected to be a sudden flood of Korean language students, but they also needed 
someone in Korea who could translate Korean. ASA hesitated just a brief moment, and 

HANDLE VIA TALBOT KEYHOLE OOMINT CONTROL QT3TBMa JOINTLY 
— NOT ItELEADADLIi! TO FOItEIOJT NATIONALS 



TOPSCCnCTUMDIU t 



40 



DOCID: 3188691 



•'(b) (1) 
(b) (3)-P.L. 



86-36 



TOP SECRfc r UMBRA 

then Kim and Chun, neither as ye^ actually cleared for COMINT, were on their way to 
Korea to assist the newly arrived ASA tactical COMINT unit. Until their clearances came 
through, they worked in a locked and guarded rooih every day. Intercepted messages were 
brought in periodically. They would translate thejtraffic and then pass it through a slot in 
the wall to the communications center. 24 

The Air Force Security/Service likewise had one unit in the Korean area in 1950 - the 
1st Radio Squadron Mobile (RSM) at Johnson Air Fjorce Base outside Tokyo. This unit had 
been created in 1942, and it had supported 5th Air Force through MacArthur's Pacific 
campaign from New 0uinea to Japan. In 1950 it was still engaged in sup port to 5th Air 
Force, but by then had changed its mission to \ ~ ^] 



]in late June it scrambled to change over to Korean targets. It had no 



cryptanalytic capability, and so began with a traffic analytic attack against North Korean 
air targets. It likewise had no cleared Korean linguists, so it could do little against 
readable voice communications. 25 



The Murray Mission 

The Air Force Security Service actually beat ASA to Korea - their first representative, 
First Lieutenant Edward Murray, arrived in Taegu on 19 July. But Murray's mission 
quickly became entangled in one of the most bizzare incidents in the history of American 
cryptology. 

When Murray arrived, 5th Air Force already had a COMINT service. The origins of that 
organization are very murky but appear to go back to the days after the end of World War 
II. At the time a civilian named Nichols, who also had a reserve commission as an Air 
Force major, headed the local Air Force Office of Special Investigations. Nichols, whose 
background and training in COMINT are completely unknown, decided that Korea needed a 
COMINT service. The South Korean government under Syngman Rhee did not appear 
interested, so Nichols proceeded on his own, seeking out the assistance of some Koreans 
with COMINT experience. 

Among his recruits was one Cho Yong II, who had come from North Korea, where he 
had been a radio operator and cryptanalyst with the North Korean Army. Joining Cho 
was Kim Se Won, a captain in the ROK navy. Kim had served as a COMINTer with the 
Japanese army in World War II and, owing to having been interned by the U.S. Army in 
Hawaii, spoke excellent English. Cho, Kim, and those who worked for them did intercept 
and translation work for Nichols; the source of funding has never been discovered. In 1949 
Cho, with Nichols's assistance, obtained a commission in the Korean air force (ROKAF), 
and his group dual-hatted as a private group working for Nichols and as the ROKAF 
COMINT service. At about the same time the ROK navy set up Kim and some colleagues 
from the Nichols group as their COMINT service, so they, too, were dual-hatted. 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 0Y0TBM0 JOINTLY 
WOT RE LEASABLE TO FOREIGN NATIONALS — 



41 



top sccncr umbiia - 



DOCID: 3188691 



TOP SECRET UMBRA 

When the ROK army retreated south in July of 1950, Nichols and his COMINT group 
retreated with them. As they fled south, fissures developed between Cho and Kim, and in 
late July or early August the Kim group seceded. Cho stayed with Nichols to' supply 
COMINT to the Air Force, while Kim eventually hooked up with ASA units entering Korea. 
Nichols was reporting directly to 5th Air Force, which was releasing his reports into USAF 
intelligence channels at the noncodeword level. 

Meanwhile, AFSS had sent Murray to Johnson Air Force Base to put together a direct 
support package. Murray assembled some vans and other equipment from 1st RSM, and 
on 15 July he flew to Korea to set up a mobile COMINT effort. AFSS was operating under a 
misty-eyed concept of COMINT as covert operations, and 1st RSM was directed to expunge 
its identifications from the equipment, and to insure that Murray could not be indentified 
as a COMiNTer. The direct support went under the codename Project WILLY. 

Murray's first concern on arriving in Korea was linguists. Fifth Air Force offered him 
eight of them, straight from the Nichols pool. The only problem was that Nichols still 
controlled them, and the upshot was that Nichols wound up with 1st RSM's equipment for 
use by his own operators. As for 5th Air Force, they were quite happy with the support 
they were getting from Nichols and informed Murray that he was no longer needed. First 
Lieutenant Murray returned to Japan on 1 August, having utterly failed to set up a 
Security Service unit in Korea and having lost his equipment to boot. 

The breathless nature of Nichols's coup left USAFSS spinning. A severe jurisdictional 
battle ensued, encompassing command organizations in the United States, Japan, and 
Korea. Security Service appeared to carry the day, and Murray was ordered back to Korea 
on 12 August, armed with a letter of authority from General Banfill (Deputy for 
Intelligence, Far East Air Force). But the struggle was far from over. Nichols was still 
unwilling to relinquish control of his COMINT organization, and he had the backing of 5th 
Air Force. Nichols was a local asset under their complete control, was publishing COMINT 
without the restrictive codewords that limited dissemination, and already had the 
expertise that Murray lacked. On 17 August, 5th Air Force ordered Murray to catch the 
next plane out of Korea. AFSS was again out of the picture. 

The Nichols effort was limited by its lack of national-level technical support from 
AFSA and USAFSS, and 5th Air Force eventually realized this. On 20 November, 5th Air 
Force reversed its earlier position and asked for the deployment of a radio squadron mobile 
to Korea to provide support. Cho's group became Detachment 3 of the 1st RSM, and 
Nichols disappeared from the scene. 

Meanwhile, back in Tokyo 1st RSM was trying to mobilize an effort against the North 
Korean air force. When Murray returned to Japan the first time he carried with him some 
captured North Korean code books turned over to him by Nichols. Lacking Korean 
translators, the unit came upon a Catholic priest named Father Harold Henry, who had 
spent a number of years in Korea as an Army chaplain. AFSS agreed to give him access to 



IIAITOLE VIA TALENT KEYHOLE COMINT CONTROL SYSTEM3 JOINTLY 
— NOT BELEACABLE TO FOREIGN WA T IOMALS 



TOP SECRET UMBRA 



42 



DOCID: 3188691 

TOP SECRET UMBRA 

intercepted materials but did not agree to give him an SI clearance. He began applying 
the code books to the traffic, and he turned out to be a pretty good cryptanalyst, even 
though he was doing the work without benefit of formal clearance. Father Henry produced 
the first decrypts of enciphered North Korean air traffic. 26 

Counterattack 

While ASA and AFSS were having trouble getting organized tactically, AFSA pushed • 
rapidly ahead. Despite an almost total lack of expertise and resources to work the 
unfamiliar Korean target, codebreakers in Washington succeeded in penetrating North 
Korean communications by late July. At the time, DPRK troops were being readied for 
their all-out assault on Taegu, which, if successful, might have caused the collapse of the 
Pusan perimeter and American defeat. Three divisions of Lieutenant General Walton 
Walker's 8th Army were on line with the remnants of five ROK divisions; opposing them 
were fourteen battle-tested DPRK infantry divisions. On 26 July AFSA decrypted a North 
Korean message which contained much of the battle plan for the assault on the 30th. The 
information reached Walker on the 29th, and he shifted his forces to meet the attack, thus 
saving Taegu and the Pusan perimeter. 27 It was one of AFSA's most conspicuous 
successes. 

On 15 September MacArthur launched the spectacular Inchon invasion, the second 
largest amphibious landing in history, near Seoul. North Korean troops suddenly had a 
large American force in the rear of their operations. On 19 September 8th Army began its 
breakout from the Pusan perimeter, and in a brief month they had pushed DPRK forces 
back north of Seoul. Syngman Rhee's government formally returned to the capital on 29 
September. But the dynamic and committed Rhee wanted to push the fighting into North 
Korea, and on 30 September, ROK troops crossed the 38th Parallel. Washington viewed 
this development with anxiety. But MacArthur was confident that Chinese and Soviet 
forces would not intervene and, like Rhee, lobbied for authority to go all the way to the 
Yalu River. The CIA issued an assessment that MacArthur was right. The risks of 
invading North Korea appeared minimal, and in the end the Truman administration 
backed MacArthur. American forces crossed the 38th Parallel on 9 October, heading 
north. 

China 

The Chinese problem which MacArthur was so blithely underestimating had been 
building for years. The postwar COMINT effort against Chinese communications began 
officially in 1945 during the mission of General George Marshall to try to get Chiang Kai- 
shek and Mao Tse-tung to the bargaining table. Marshall, familiar with what COMINT had 



• HANDLE VIA TALENT KEYHOLE COMINT CONTROL 0Y0TEMU JOINTLY 
NOT ItELEAOADLE TO FOIIEIQN NATIONALS} 



43 



TOP SECRET UMBRA- 



DOCID: 3188691 



TOP SECRET UMBRA ' 



--1(b) (1) 
/ lb) (3J-P.L. 86-36 
; (b) (3)-50 USC 403 
;' (b) (31-13 USC 798 



done during World War II, requested COMINT information from both Commiin% and 
Nationalist communications. / 



f 

ASA mounted a small e ffort against both the Nationalists and Communists. 



ASA could still report that the two sides were/ far apart;; and it 
was obvious from the COMINT traffic that they were determined to settle/their differences 
on the battlefield. The Marshall mission was withdrawn in 1946, and in October of\l949 
Mao triumphed. / \ 

Following the withdrawal of the Marshall mission, the COMINT mission against ckina ' 
suffered, as ASA employed all available resources against the Soviet target.1 X 



.ASA kept only a small section against Chinese civil communication's. 
Collection resources were concentrated atj 



security problems. 28 

When American and South Korean troops crossed the 38th Parallel, the Chinese had 
already decided to intervene in North Korea. The decision wag taken at a meeting in 
Beijing from 3 to 7 October 1950. On the first day of the conference, Chinese foreign 
minister Chou En-Lai called Indian ambassador Panikkar to tell/him of the decision, and 
Panikkar relayed this news to the West. But Indians were regarded as pathologically left- 
leaning, and Panikkar's communique was disbelieved. Chou's warning was followed up by 
Chinese radio broadcasts, but these, too, were disregarded. 29 / 

Historian Clay Blair asserts that "when MacArthur returned to Tokyo from Wake 
Island [in mid-October] he had no inkling of the CCF armies gathering in North Korea." 30 



iof the massing of Chinese 



This was wrong. AFSA had clear and convincing evidence/ 

troops north of the Yalu and had published it in product reports available to the JCS, the 
White House, and to MacArthur. As early as July, AFSA/ began noting references in 
Chinese civil communications to army units moving north. / Rail hubs in central China 
were jammed with soldiers on their way to Manchuria./ By September AFSA had 
identified six of the nine field armies that were later involved in the fighting in North 
Korea and had located them in Manchuria, near the Korean .border. Ferries at Anshan (on 
the Yalu River) were being reserved for military use. Maps of Korea were being ordered in 
large quantities. On 7 November, in voice communication 's intercepted and published by 
the COMINT community] ~ [stated, "We are already at war 

here." 31 1 



HANDLE VIA TALEIfT KEYHOLE COMINT CONTROL 3Y0TEM0 JOINTLY 
NOT KELEAOADLE TO F0REI0N NATIONAL!) 

-TOP SCCnCT UMBRA 44 



DOCID: 3188691 

— TOP SECRET UMBRA 




Douglas MacArthur with President Truman on Wake Island, 1951 

That was not news to the ROK army. On 25 October a ROK division had been badly 
mauled by elements of the Chinese 40th Army, already reported by AFSA to be close to 
Korea. Five days later MacArthur's chief of staff, Lieutenant General Ned Almond, 
reported that he had seen Chinese POWs being held by a ROK unit. On the first of 
November, a Chinese force attacked a U.S. unit for the first time. But Charles 
Willoughby, MacArthur's G2, preferred to believe that these encounters represented 
isolated PRC volunteers rather than division-strength regular army units confronting UN 
troops. 32 

AFSA reports continued to document the presence of major Chinese forces on the Yalu, 
but the reporting was subtle. AFSA was regarded as a collection and processing agency, 
not as a producer of intelligence. There were no dramatic wrap-ups, no peppery 
conclusions - just the facts, strung through a flood of intelligence reports. The COMINT 
community had almost the only hard information about the status of Chinese forces. 33 

Intelligence agencies were beginning to pay attention. The Watch Committee of the 
JIIC, which began noting Chinese troop movements as early as June, concluded by 
September (probably on the basis of AFSA reporting) that these troops were moving north 
rather than to the coastal provinces near Formosa. By mid-October, influenced perhaps by 
MacArthur's opinions, the Watch Committee had concluded that, though there was 
convincing evidence that startling numbers of Chinese forces were in Manchuria, the time 
for intervention had passed - they assessed that the Chinese would not intervene. 



HANDLE VIA TALENT KEYHOLE 0OMINT CONTROL DTQTEMO JOINTLY 



45 



TOP SECRET UMDHA 



DOCID: 



3188691 
.Trip Torn- nMnn rr 



However, encounters with Chinese ground and air forces in late October and early 
November caused the committee to take another look. Admiral Arleigh Burke, who 
commanded naval forces in the region, was convinced that Chinese intervention was 
imminent and brought up the subject twice to Willoughby, who summoned his very large 
staff to try to dissuade Burke. 34 

MacArthur continued to press ahead with offensive operations to reach the Yalu and 
get the boys home by Christmas. But on the snapping cold night of 25 November with 
trumpets braying, thousands of Chinese soldiers fell on unsuspecting units of the 8th 
Army. The American offensive turned quickly into a defensive, and a defense into a rout. 
The American and ROK armies were overwhelmed, and some units were virtually wiped 
out. Weeks later the front stabilized near Seoul, and the war settled down to grim trench 
warfare for almost three more years. 



AFSS and ASA Operations 

AFSS operations in Korea continued their harrowing path. The decision in November 
to send regular AFSS units occurred just prior to the Chinese invasion. Two locations 
were envisioned: one in Sinanju to intercept North Korean targets in the battle zone and a 
rear detachment in Pyongyang to intercept related Soviet and Chinese communications. 
But even as the two detachments were in the air on their way to Korea on 28 November, 
the Chinese had attacked, and Sinanju was not safe. The unit destined for Sinanju was 
diverted to Pyongyang, much further south, while the detachment commander was flown 
to Sinanju to assume command of the troops on the ground (the Cho detachment) and to 
get them to safety farther south. AFSS in Korea operated as Detachment Charlie of 1st 
RSM until 1951, when the 15th RSM was activated to control all AFSS Korean 
operations. 35 The Cho group made it safely back to Allied lines, and by February of 1951 
the front had stabilized just south of Seoul. 

ASA tactical units dug in for the winter. ASA manual Morse in tercept efforts in 
Korea were having very mode st success. Most intercepted material wasl 

p roviding little of tactical value. But sometime in February / 

reports began to illter to ASA that UN front-line troops were hearing Chinese voice / 
communications. ASAPAC (Advance) sent an investigating officer to IX Corps, and he/ 
reported that there was a good volume of spoken Chinese interceptable. / 

ASA already had some Chinese linguists, but what they needed to exploit this type,4f 
nonstereotyped communications was native linguists. &n arrangement wa s made witji a 
former Nationalist Chinese general working for the U.S. in Tokyo to begin hiring foriner 
Nationalist officers from Formosa. They were enticed to Korea by the. promise of earning 
GS-6 pay as Department of the Army civilians, and they were to enjoy officer status while 
in Korea. Competition was keen, and by the summer of 1951, Chinese linguists' were 
flocking to ASA units in Korea. (b) (i) 

(b) (3)-50 USC 403 
(b) (3) -18 USC 798 
(b) (3)-P.L. B6-36 

HANDLE VIA TALENT KEYHOLE COMINT CONTROL 3Y3TEM3 JOINTLY 
NOT RELEA8ADLE TO FOREIGN NATIONAL3 



TOP SCCRCT UMBRA 



46 



DOCID: 3188691 



TOP SECRET UMBRA 




DF operations - an ASA DF unit in the mountains of Korea 



The linguists were formed into Low-Level Voice Intercept (LLVI) teams and were 
positioned as close to the front lines as possible. The effort was expanded to include 
Korean LLVI, although that part of the program got off to a slower start because of the 
difficulty of getting good linguists in a cleared status. Low-level voice quickly became the 
prime producer of COMINT in Korea, and the demand for LLVI teams overwhelmed ASA's 
ability to provide enough good linguists. The program expanded from one unit, to seven, 
to ten, and by the end of the war there were twenty-two LLVI teams, including two teams 
dedicated to tactical voice intercept. 36 

In September of 1952 the 25th Infantry Division began picking up Chinese telephone 
communications from their tactical landline telephones. This was accidental, of course, 
and apparently originated from a sound detecting device normally used to indicate the 
approach of enemy troops. When the unit moved offline, they passed on the technique to 
the relieving 40th Infantry Division. The 40th improved the equipment but did no 
analysis. In November, an ASA liaision officer at division headquarters was notified, and 
ASA proceeded to develop the technique on other sectors, supporting it with LLVI teams 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 3V3TEM3 JOINTLY 
HijiLHiASABLR 10 FOREIGN NATIONALS 



47 



JOP SECRET UMDRA" 



DOCID: 3188691 



/(b) (1) 
(b) (3J-P.L. 86-36 
(b) (3) -50 USC 403 
(b) (3) -18 USC 798 



lUI'lLCHLI UMbllA 



consisting of either Korean or Chinese, linguists, depending on wiich type of unit was on 
the other side of the line. The Americans had accidentally rediscovered a technique for 
gathering intelligence which had originally been dev eloped during} World War I and which 
had been a prime producer of tactical information. ' ' : : 



These LLVI teams were quite small, consisting only /of an ASA officer* a couple of 
enlisted men for analysis, and two or three native linguists. Their value lo front-line 
commanders, however, far outran their cost, and LLVl/was hailed as one oT the most 
important producers of tactical intelligence during the war. 

White Horse Mountain / 

As the conflict settled down to unremitting trench/ warfare, highlights were few, and 
peace talks gradually replaced warfare in Americaii newspapefs. But the fron^ lines 
continued to shift imperceptibly as the two sides bludgeoned each other in a series of 
bloody encounters to take high ground. One of those, ihe battle for White Horse Mountain, 
illustrated the use ofcOMINT in a tactical situation. / 



The action was originally tipped off by 



a Chinese Communist 



military message that was in the hands of the tac tical comma nd before the battle too*: 
place. ASA set up a special | [effort and tactical communications to 



report information that might bear on the battle 



True to the intelligence prediction, the Chinese launched a massive infantry assault 
on American and ROK troops at White Horse on 6 October and persisted until 15 October. 
Throughout the battle, LLVI teams kept the American commander informed of the 
position and activities of Chinese units. In a precursor to Vietnam, the American units 
were able to call artillery fire on Chinese positions on the basis of the LLVI-provided 
information. 38 The Chinese suffered nearly 10,000 casualties out of some 23,000 
committed to the battle. 39 



AFSS Introduces Tactical Warning 

Like ASA units, AFSS operations in Korea depended increasingly on intercept of low- 
level voice communications, using this for tactical warning. The concept relied on the 
Joint Training Directive for Air-Ground Operations published in 1949, which stated that 
the primary purpose of radio squadrons mobile for tactical support was to collocate with 
the Tactical Air Control Center (TACC) so that direct tactical warning could be supplied. 
(This followed World War II COMINT doctrine used effectively by Lieutenant General 
Kenney at 5th Air Force.) 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SYSTEMS JOINTLY 
- NOT RELEA3ADLE TO FOREIGN NATIONALS 



TOP SCCnCTUMDflA - 



48 



DOCID: 3188691 

T O P SECRET UM0I1A . 

Because of the lack of linguists, AFSS was slow to set up this service in Korea. 
However, in the early spring of 1951 AFSS units began intercepting Soviet ground- 
controlled intercept (GO) communications, and this spurred Far East Air Force (FEAF) 
into requesting AFSS tactical support. Fortunately, AFSS did have some Russian 
linguists, and eight of them were on their way to Korea in April to form the first linguist 
team. They originally set up a mobile intercept and processing hut at Pyongtaek in 
central Korea, and communicated with the TACC by landline. No one in the tactical air 
operation was cleared for comint, so it was disguised using a simple substitution code to 
identify enemy aircraft and ground checkpoints. Arrangements were made for the TACC 
controller to pass relevant COMINT, intermixed with radar plots, to fighter pilots. The 
operation was nicknamed "YOKE," and became highly successful because it significantly 
expanded the range of control of the TACC and improved the air controllers' ability to 
warn pilots of impending threats. 

As the front advanced north of Seoul, so did the air control operations. In June of 1951, 
the entire air control operation moved forward to a hill four miles northeast of Kimpo 
Airport near Seoul. But in August hearability deteriorated, and the operation, including 
the TACC and Security Serice operations, migrated by LST to Pyong-Yong-Do island. 
Only six miles from enemy lines, T-Y-Do" (as it was called) was in an ideal location. The 
site at Kimpo was kept open, and linguists were split between the two sites. 

Soon AFSS was finding tactical voice communications in Chinese and Korean as well 
as Russian. Two more voice teams were established for the additional languages. The 
Korean voice team consisted of the Cho contingent of the Nichols group. The Chinese 
team set up shop on the campus of Chosen Christian College in Seoul (today, Yansei 
University). AFSS acquired its Chinese linguists in Korea basically the same way that 
ASA did - they hired foreign-born linguists. In this case, they did business with one 
General Hirota, a former chief of the Japanese army COMINT agency during World War II. 
Hirota hired twelve Japanese linguists who were fluent in Chinese. 

With so many languages involved, the tactical support operation was unusually 
complex. The AFSS facility at Kimpo correlated Chinese early warning voice, Chinese 
GCI voice, Soviet GCI voice, Chinese air defense Morse and Korean GCI voice. Each input 
was produced by a separate team, and each team was in a different location for security 
purposes. 40 

In September of 1951 the P-Y-Do operation was closed down and moved back to Kimpo, 
and that fall all AFSS operations were consolidated at Chosen Christian. This was the 
first time that all components of the operation were collocated, which made correlation of 
activity easier. According to one officer involved in the operation, "the present top-heavy 
success of the F-86s against MIG-15s dates almost from the day of the inception of the new 
integrated voice-CW-YOKE service." 41 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL DY0TEM3 JOINTLY 
NOT RELEASABLE TO FOBEICN NATIONALO 



49 



T OI ' S LI UL I UMUUA 



DOCID: 3188691 



TOP SECRET UMBRA 

In early 1952 much of the GCI traffic that AFSS had been intercepting began to dry 
up, and AFSS became convinced that it had gone to VHF. Moreover, about that time the 
Chinese stopped tracking Communist aircraft, and they tracked only "hostiles." These 
twin changes spelled potential disaster for AFSS tactical operations. From a practical 
standpoint, the lack of tracking would force AFSS to rely almost entirely on intercepting 
GCI communications. But since these communications were disappearing, probably to 
VHF, that source of information was also drying up. The changes also generated a 
security problem, since the positions' of Communist aircraft had been disguised as radar 
plots when being passed to the TACC. If there were no more radar position reports, 
disguise of the origin of the information would be much more difficult. 




Delmar Lang on Cho-Do Island in 1952 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL OYQTEMO JOINTLY 
NOT RELEASABLE TO FOREIGN NATIONALQ 



lOHSfcCKfcl UMbKA 



50 



DOCID: 3188691 



TOP SECRET UMBRA 

These developments roughly coincided with the arrival of the first batch of school- 
trained American Chinese linguists, headed by Lieutenant Delmar "Del" Lang, in mid- 
1952. At the time the unit was located in Seoul, where VHP intercept was hardly possible, 
while the TACC had moved to Cho-Do Island, near the North Korean harbor of Wonsan! 
Information had to be relayed from the AFSS unit to Kimpo and from Kimpo to Cho-Do. 
Lang moved the operation to Cho-Do Island and collocated it with the TACC. Tests on 
Cho-Do in August of 1952 confirmed that both the Soviets and Chinese were now using 
VHF for their GCI control activities. 

To solve the security problems and to make sure that the TACC controller got the best 
possible support, Lang positioned an AFSS linguist in the TACC in March of 1953, sitting 
next to the controller. The linguist had a field phone on his desk, the other end of which 
was attached to the output of a receiver at the Security Service intercept unit three- 
fourths of a mile away. In an era when no one knew much about tempest (see chapter 5), 
such a wireline was regarded as secure simply because it was a landline. 42 

Combined with improved hearability, the new lash-up at Cho-Do Island provided the 
best support that AFSS mustered during the entire war. In one day, which Lang described 
as the "great Korean turkey shoot," American F-86s downed fifteen MIGs without a loss, 
even though none of the MIGs was ever seen on radar. The information came, of course, 
from the COMINT operation at Cho-Do. A visiting ASA colonel commented that "it was just 
like shooting ducks in a rain barrel." It was a model for tactical COMINT operations and 
was resurrected by the same Del Lang years later in Vietnam. (See chapter 12.) 43 

The Navy 

Naval cryptology was a bit player in Korea. The DPRK had no blue-water navy, and it 
was so weak that the Inchon invasio n went unopposed from the naval standpoint. The 
nav al COMINT unit in the region wag 



Bufl Jwas not concerned wjth the small collection of DPRK coastal patrol craft. The 

organization concentrated instead almost entirely on the Soviet navy in the Pacific, to 
determine what moves, if any, the Soviets would make toward the U.S. presence on the 
/Korean peninsula. 

The unit was.housed in cramped quarters in a former Japanese artillery training 
school, entirely too small and inadequate for the purpose. NSQ found an old Japanese 
ammunition storage buildin g about te n miles from] Rehabilitation began in 



1951, and in November 1952) |moved to 

years 



where it remained for many 



Most of the NSG support to the war effort came from its afloat detachments. 
Originating out of Hawaii, detachments were placed aboard 7th Fleet vessels beginning in 
August 1951, and at the end of the war, 7th Fleet had three such units. 4 * 



ID) U) 

(b) (3)-50 USC 403 

(b)(3)-p.L. 86-36 HANDLE VIA TALENT KEYHOLE COMINT CONTROL 3Y3TEM8 JOINTLY 

NOT R.ELGA3ADLG TO FOREIGN NA T IONALS 



51 



TOP GCCnCT UMDRA 



DOCID: 



3188691 

TOP SE C RE T UMBRA 



The AFSA Factor 



On the home fr ont, AFSA provided significant help to battlefield commanders. 
AFSA's quick work | [ in time to turn the tide at Taegu 

appeared to portend the same kind of COMINT efiectaveness that the U.S. had enjoyed 



during World War II. But it was not to be. T 



In November 1950, with Chinese Communist troops flooding into Nort h Korea, AFSA 
turned its attention to Chinese communications. 



In 1952 the painfully slow progress on traffic analysis of ChinWe army nets finally! \ 
began to bear fruit. There were indications through traffic analysis that the 46th Army: \ 
was moving northward. The army eventually arrived in Manchuria and crossed the 1 1 
border into Korea. As it did so, AFSA began exploiting People's Volunteer Army (PVAj \ 
nets from a traffic analytic standpoint, and it achieved a level of competence on PVA net|; 
that allowed extremely accurate order of battle determinations, unavailable through any? 
other intelligence source. Through traffic analysis AFSA noted the buildup of PVA units/ 
on the eastern front, and this allowed 8th Army to reinforce its right side prior to a majo^ 
PVA assault on 15 July 1953. 48 (I 



Relations with ROKCOMSEC and COMINT 

COMSEC assistance to ROK forces began almost as early as COMINT collaboration. |n 
September 1950 ASA was asked to furnish low-level cryptographic assistance Vor use $y. 
the ROK army. After conferring with AFSA, ASA shipped some strip ciphers and. Playfcfir 
squares. It was soon found, however, that these very time-intensive systems woii|d not jbe 
fast enough, and in 1953 ASA provided the first electromechanical cipher equipment, $ie 
BACCHUS system. Laterin the year ASA also released the DIANA one- time-pad systeW 9 ! 

Cryptologic cooperation with the ROK COMINT organizations continued throughout 
the war. USAFSS continued its relationship with the Cho group, while ASA continued to 
do business with the Kim group. In November 1951 ASAPAC proposed the consolidation 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 0V0TEMO JOINTLY 
MJ1 KfcLKAAAflUii TO FOREIGN NATIOHALC 



(b) (1) 

(b) (3)-50 USC 403 
(b) (3) -18 USC 798 
(b) (3)-P.L. 86-36 



TOP SECRET UMBRA 



52 



DOCID: 3188691 



(b) (1) 

(b) (3J-P.L. 86-36 
(b) (3) -50 USC 403 
(b) (3J-18 USC 798 



TOP SECRET UMBRA 



of the two efforts, but AFSS firmly rejected the overture. This was probably based on Air 
Force fear that ASA would dominate the relationship and get back into the business of 
copying North Korean air targets, but this may also have been based on the very realistic 
appraisal that the animosity between Kim and Cho was unbridgeable. 50 

The situ ation continued unchanged, and late the next year an official for the newly 
created NSA/ ' \ : 



By charter (NSCID 5), CIA had control of all foreign intelligence relationships. But 
the "battlefield marriage" between the American and South Korean COMINT organizations 
represented a significant exception to the general rule. Korea wasJCS turf, and military 
commanders were cool to CIA participation in their arena. 



HANDLE VIA TALEliT KEYHOLE COMINT CONTROL QY3TEM3 JOINTLY 
WO T R.ELEA3ADLE TO F0HT1IQN NATIONALS 



53 



TOP SECRET UMBRA 



DOCID: 3188691 



TOP SECRET UMBRA 



(b) (1) 

(b) (3)-50 USC 403 
(b) (3) -18 USC 798 
(b) (3J-P.L. 86-36 

t : 




Korea - An Assessment 

The Korean War occurred during a period of struggle in the cryptologic community. It 
began a year after the formation of AFSA and concluded after the AFSA ship had been 
finally scuttled in favor, of a new vessel, the National Security Agency. Tlie demands of 
war highlighted the fissures in the structure, and those fissures in turn made prosecution 
of the war more difficult. AFSA wrestled with the SCAs over control of intercept positions 
and targets throughout its existence, and many of those battles were related to the war 
effort. The Brownell Committee was convened in part because of complaints by 
organizations outside the Department of Defense over degraded cryptologic sbpport 
resulting from the war. The committee stressed in its final report that the cryptologic 
community had been shown deficient in its effort during the war. NSA replaced &FSA 
partly because of what was happening (or not happening) in Korea. | 1 

But after forty years the picture does not look quite so bleak. Actually, kFSA and the 
SCAs provided good support to the war effort. Although AFSA (along with everyone Wise) 
was looking the other way when the war started, it did a remarkable aiout-face,! and 
within a month it was producing large volumes of decrypted information from Nbrth 
Korean communications. Its accomplishments during the battle f or the Pusan perimeter, 

{ and using ithe 

information to support tactical commanders, were considerable and important. The 
reporting program, although hampered by restrictions on AFSA's production! of 
"intelligence" as opposed to "intelligence information," was farsighted and effective. 
AFSA, almost alone among intelligence agencies, foresaw the Chinese intervention. The 
development of Chinese and Korean order of battle owed much to AFSA's high-powered 
traffic analytic effort. 

After a slow start occasioned by lack of mobility, tactical resources, linguists, an|l 
working aids, ASA and USAFSS put together highly credible battlefield COMINT 
organizations. ASA's LLVI program produced more valuable information for ground 
commanders than any other source. AFSS put together a system for warnin g, fighter pilots 
which was partly responsible for the much-ballyhooed kill ratio in that war. 1 



HANDLE VIA TALENT KEYHOLE OOMINT COirHlOL SY0TEM3 JOINTLY 
— NOT BELEA S ABLE TO FOItEIQN NATIONALS 

T O P S Ec ZRL I UMUHA — 54 



DOCID: 3188691 



TOP 3 L C I tL I UMUI1A 



AFSA's quick start was not sustained. Beginning in July of 1951, the North Koreans 
began a total changeover of their communications procedures^ 



In the first month of the war, AFSA read more than one third of all North Korean 
cipher messages received , and by December AFSA was reading more than 90 percent. / "" 

. | The new North Korean security 

measures were evidently inspired by the Soviet Union, whose communications had in 1948 
undergone a similar transformation in the face of possible American and British 
exploitation efforts. (See chapter 4.) It was accompanied by a decline in North Korean 
radio messages incident to the beginnings of static trench warfare roughly at the 38th 
Parallel, which gave the enemy a chance to divert radio communications to landline. 



'(bid) ; ■ ; 

(b) (3)-E.l. 86-36 
(b) (3)-50 USC 403 
(b) (3) -18 USC 798 

HANDLE VIA TALENT KEYHOLE OOMIKT CONTROL 3Y3TEM3 JOINTLY 
WOT ItELEAOADLE TO FOREIGN NATIONALS 



55 



TOP SECRET UMBRA 



DOCID: 3188691 



TOP SCCRETUMmiA 



/■(b> (1) 
/• )(b) (3)-50 USC 403 
S(b) (3J-18 USC 798 
(b) (3)-P.L. 86-36 



Security was a problem in Korea, as it has been during all wars. Occasional press 
releases exposed COMINT support to battlefield commanders. The release of information 
about AFSS exploitation of GCI communications became so serious that in October 1951 
Detachment 3 of 1st RSM took the extraordinary step of suspending operations for a few 
days until they got the attention of key officers in 5th Air Force. 56 The employment of 
tactical GCI voice and tracking information in the air war caused AFSS to devise new 
measures to cover the information, and it set a precedent for use of similar information 
during the war in Vietnam. 

When NSA was created in November 1952, immediate steps were taken to sort out the 
effort in Korea. NSA's recommendations amounted.to a classic "lessons learned" about 
war. Most pressing was a program which would allow the use of indigenous personnel 
with native language capability. Almost as urgent was the need to sort out the tangled 
relationships with the various ROK COMINT efforts. It would also be necessary to increase 
NSA representation in the field and to expand existing field offices with technical experts 
assisting the SCAs. Finally there was a call to develop new special identification 
techniques th at would allow NSA and the SCAs to track target transmitters [ 



, NSA sponsored these themes for years, until they 

became tantamount to COMINT doctrine on warfighting. 

One beneficial effect of the Korean conflict was to begin a rapid rise in cryptologic 
resources. In July 1950 USCIB recommended to the National Security Council that 
COMINT receive a hiring jolt. The NSC approved this on 27 July in a meeting attended by 
the president himself. 58 

Korea was America's first stalemated war, and recriminations resounded for years 
later. But even an acerbic CIA critic of the cryptologic community had to admit that 
"COMINT remained the principal source of intelligence for threat until 27 July 1953, when 
the armistice was signed at Panmunjom." 59 



Notes 

1. Rowlett interview, OH 14-81. 

2. Sinkov interview, OH 2-79; oral history interview with Herbert L. Conley, 5 March 1984, by Robert D. Farley, 
NSA OH 1-84. 

3. See both Burns, Origins, and Howe, "Narrative." 

4. William L. O'Neill, American High: The Years ofConfidence, 1945-1960 (New York: Free Press, 1988.) 

5. See Burns. Origins, 65. 

6. CCH Series V.F.5.1. 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 0YaTEM3 JOINTLY 
NOT RELEA3ABLE TO FOREIGN NATIONALS — , 



TOP SCCnCT UMDnA 



56 



DOCID: 3188691 i, (b,(3) - p - L • S6 - 36 



/ 1 1 

/ j \ TOP SECRET UMBRA 

/ I \ 

7. Howe, "Narrative." / / 

8. Burns, Origins, 70-71. ill 

■■ 1 i 

9. Howe, "Narrative." | | 

/ / \ 

10. Burns, Origins, 75-77; "Report to the Secretary of State and the Secretary of Defense by a Special Committee 
Appomted Pursuant to Letter of 28 December 1951 [BtowneU Report]," in CCH Series V.F.7.13; NSA Archives, 
ACC 26350, CBSK 32; "Analysis of AFS£ Effortln the Korean Action," unpublished draft, USAFSS, n.d., in CCH 
Series V.M.4.I.; A Reference Guide tj> Selected Historical Documents Relating to the National Security 
Agency/Central Secruity Service, 1931-1985, Source Documents in Cryptologic History, V. I (Ft Meade: NSA 
1986), 36, 38. ; j 

1.1. Wenger comments on Howe draA history ii CCH Series V.A.13. 

12. Burns, Origins, 59-96. • 

13. Burns, Origins, 89; 
10684, CBRI 52. 



'Consumer; Liaison Units, 1949-1957," in NSA/CSS Archives ACC 



14. Howe, "Narrative"; "JCEC/Memo for Information No! 1, Charters," in CCH Series V.G.2.; BrowneU Report. 

15. BrowneU Report. 

16. Ibid. 

17. Ibid. See also Howe "Narrative"; Burns, 107-108. 

18. An excellent account^ the diplomatic background to the invasion of Korea can be found in Clay Blair, The 
ForgottenWar: America/in Korea, 1950-1963 (New York: Times Books, 1987); and Joseph Goulden, Korea: The 
Untold Story of the War (New York: Times Books, 1982). \ 

19. Seel 



JThe U.S. COMINT Effort during the; Korean Conflict - June 1950-August 1953," pub. on 



6 Jan. 1954, an unpublished manuscript in CCH collection, series V.M.1.1. See also Howe, "COMINT 
Production ..." and The *BrowneII Committee Report', 13 Jube 1952, in CCH series VI.C.1.3. 

20. [AFSA 235] no title [report on significant activity conne cted w ith the entry of Chinese Communists into the 
Korean conflict], 25 March 1952, in CCH Series V.M.7.I.; an d] | The U.S. COMINT Effort. ..." 

21. William L. O'Neill, American High: The Years of Confidence, 1945-1960. 

22. Howe, "COMINT Production . . .»; Dick Scobey (NSA), draft study of ROK SIGINT Effort, no date, in CCH 
series V.M.6.I.; Assistant Chief of Staff, G2, "COMINT Operations of the Army Security Agency during the 
Korean Conflict, June 1950-December 1953," in CCH Series V.M.2.1. 

23. Blair, Forgotten War, Ch. 2-4. 

24. Interview Youri P. Kim, 22 February 1982, by Robert D. Farley, OH 2-82, NSA. 

25. Hq USAFSS, "Analysis of AFSS Effort in the Korean Action," unpublished draft manuscript in CCH series 
V.M.4.1. 

26. Summaries of Project WILLY can be found in the following sources: Hqs USAFSS, "Analysis of AFSS 
Effort . . .," Dick Scobey, "Draft Study of ROK SIGINT Effort"; ["Hop" Harriger], "A Historical Study of the Air 
Force Security Service and Korea, June 1950-October 1952," on file at Hqs AIA in San Antonio. 

27. Manuscript entitled "SIGINT in the Defense of the Pusan Perimeter: Korea, 1950," (SC) in CCH series 
V.M.1.10. See also Clay Blair, TheForgotten War, 240. 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SY3TEM3 JOINTLY 
NOT RELEA3ADLE TO FOREIGN NATIONALS 



57 



TOP SECRET UMBRA 



DOCID: 3188691 

(b) (3J-P.L. 86-36 

TOP SECRET UMBRA 

28. Guy Vanderpool, "COMINT and the PRC Intervention in the ry>rean War," paper avaUable in CCH. 

29. Roy E. Appleman, Disaster in Korea: The Chinese Confront MaiArthur (College Station, Texas: Texas A and 
M Press, 1989). 

30. Blair, Forgotten War, 350. 

31. [Drake, Robert, and others] "The COMINT Role in the Korean War)? unpublished manuscript in CCH series 
V.M.1.9. See also Howe, "COMINT Production in the Korean War . . .»; oial history interview Milton Zaslow, 14 
May 1993 by Charles Baker and Guy Vanderpool, NSA OH 17-93; oral, history interview Robert Drake, 5 
December 1985 by Robert D. Farley and Tom Johnson, NSA OH 18-85; oral history interview Samuel S. K. Hong, 
9 December 1986 by Robert D. Farley, NSA OH 40-86. 

32. Blair, Forgotten War, 375-78. 

33. Zaslow interview; Drake interview. 

34. Department of the Army G2, "Indications of Chinese Communist Intentions to Intervene in Korea," 7 May 
1954, in CCH series V.M.7.4.; oral history interview Admiral Arleigh Burke, 9 December 1981, by Robert D 
Farley and Henry F. Schorreck, NSA OH 13-81. 

35. "Analysis of AFSS Effort . . ."; George Howe, "COMINT Production in the Korean kr. . . .» 

36. Assistant Chief of Staff, G-2, "COMINT Operations . . . » contains the best summary \,fLLVI operations. 

37. See Assistant Chief of Staff, "COMINT Operations . . . ," 56-57. 



38. Assistant Chief of Staff, G-2, "COMINT Operations . . . ." See also oral history interview 
April 1982 by Robert Farley, NSA Oral History 9-82, 122. 



24 



39. For a description of the action, see Walter G. Hermes, Truce Tent and Fighting Front, United States Army in 
the Korean War (Washington, D.C.: Office of the Chief of Military History, United States Army, 1966), 303-08. 

40. Summaries of AFSS tactical operations can be found in the following: USAFSS, "Analysis of AFSS Effort in 
the Korean Action," unpublished draft in CCH Series V.M.2.I.; NSA, "Review of U.S. Cryptologic Effort 1952- 
54," in CCH series VI EE.1.3/, and [Hop HarrigerJ "A Historical Study. ...» The latter document contains the 
fullest explanation of the Yoke operation. 

41. [Hop Harriger] "A Historical Study. . . 72. 

42. The new operation is described in USAFSS, "Analysis of AFSS Effort . . ."; "Historical Data Report for the 
6920 SG, 1 January 1953,"; interview with Delmar Lang [undated], in CCH Series VI, AFSS section; and Major 
Chancel T. French, "Deadly Advantage: Signals Intelligence in Combat, V. II," Air University Research Report 
#AU-ARI-84-l,1984. 

43. French, "Deadly Advantage . . oral history interview Col (USA, Ret.) Russell H. Horton, 14 March 1982 by 
Robert D. Farley, NSAOral History 6-82. 

44. U.S. Naval Security Group, "U.S. Naval Communications Supplementary Activities in the Korean Conflict, 
June 1950-August 1953," in CCH Series V.H.3.1. 

45. Richard Chun, unpublished manuscript in CCH Series V.M.1.1 1. 

46. Drake and others, "The COMINT Role in the Korean War." 

47. Assistant Chief of Staff, G-2, "COMINT Operations. . . ." 

48. [Drake and others] "The COMINT Role in the Korean War." 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL VOTE MB JOINTLY 



TOP SECRET UMBRA 



58 



DOCID: 



3188691 



(b) (1) 
(b) (3) 
OGA 



-lUI'ULUlLI UMLlllA" 



49. "U.S. Cryptographic Assistance and COMINT Collaboration with the ROK," 24 February 1955, in CCH 
Series V.M.6.5, 

50. File of memos related to the history of AFSA/NSA communications center, in CCH Series VI.H.1.2. 

51. NSA, "Study of the COMINT Situation in Korea," undated memo (probably December 1952) in CCH Series 
V.M.I .14. 

52. "Agreement on COMINT activities between the U.S. and the Republic of Korea, 1956 " in CCH Series 
V.M.6.3. 

53. Brownell Committee Report, G-l-G-2; see also Mary E. Holub, Joyce M. Horns and SSgt Kay B. Grice, "A 
Chronology of Significant Events in the History of Electronic Security Command, 1948-1988," 1 March 1990, in 
CCH Series X.J.6. 

54. CCH Series VI.A. 1 .3. 

55. "Study of the COMINT Situation in Korea." 

56. "Analysis of AFSS Effort in the Korean Action." 

57. "Study of the COMINT Situation in Korea." 

58. USCIB memorandum, 20 July 1950, and NSC memorandum dated 27 July, in Harry S. Truman Library, 
Independence, Missouri (contained in CCH Series XVI). 



59; 



The History of SIGINT in the Central Intelligence Agency, 1947-1970," October 1971, V. 



I., 86 in CIA history collection, Ames Building, Rosslyn, Virginia. 




DOCID: 3188691 



(b) (1) 

(b) (3)-50 USC 403 
(b) (3) -18 USC 798 
(b) (3)-P.l. 86-36 



- TOPSCCnCTUMDnA 



Chapter 3 
Cryptology under New Management 



/(b) (1) 
(b) (3) 
OGA 



There is something about cryptologic work that gets into the hide 



Ralph Canine, 1968 



NSA began life under a pall. The Brownell Committee ha!d declared its predecessor to 
have been a failure. Outside the cryptologic community ther e was a common fesl ing that 
COMINT was broken and in serious need of repair. According tc Lho was 

appointed by Allen Dulles to ride herd on the cryptologic effort, 

The early 1950s were the dark ages for communications intelligence. Intelligence officers who 
had been accustomed to providing information riot only on the capabilities but also on the 
intentions of the enemy during World War II were reduced to providing the government with 
estimates based on frail fragments of information rather than factual foreknowledge. 



I _x 

The creation of NSA was an attempt to address the problems of cryptology as the 
Brownell Committee saw them. (As we saw in the section on Korea, that perception was 
not 100 percent accurate.) That is, it attempted to institute a firm control mechanism that 
would unify the system and create an organization which was, in and of itself, responsible 
for getting the job done. No longer would consumers have to go to four different 
organizations to get answers or to fix blame for the lack of answers. It did not give the 
organization resources, improve its personnel situation, or give it adequate working space. 

When NSA began life, it simply inherited its resources from its predecessor. It got the 
AFSA billets and the people in them, the AFSA spaces at Arlington Hall, and the AFSA 
rooms at the Naval Security Station. And it inherited an idea, that unification worked 
better than division. The difficulty was in trying to implement the solutions that the 
Truman Memorandum imposed. AFSA, despite its failings, had been a step in the right 
direction. NSA now had to take the next step. 

To the AFSA population, the name change must have seemed more for appearance 
than for any practical value. There was no immediate change in their condition. They 
stayed where they were - if they were COMINTers, they remained at Arlington Hall, and if 
they were COMSECers, they stayed at Nebraska Avenue. Lieutenant General Canine, who 
had replaced Admiral Stone as AFSA director, stayed on as director of NSA. When Canine 
first gathered the NSA work force together on 25 November 1952, he alluded to the 
conflicts which had preceded the establishment of NSA, but they must have seemed 
remote to those who listened. It looked like business as usual. 



HANDLE VIA TALENT kf.vhdi .v. rnmiww iiM'l'Wi 1 >l .systems JOINTLY 
5ASABLE TO FOREIGN NATIONALS 



61 



TOP^SJECREWIvTBRa" 



DOCID: 3188691 



TOMKRifUMfTRA 




. i 



i 



- ^^=:^-* , - tt: - i -_J!J.FS(S 




Lieutenant General Ralph J. Canine went to bat for the new organization at a time when ita 
existence was challenged and its longevity was far from certain. 



Canine and the New Organization 

But it was not to be business as usual, largely because of the personality of the first 
director. Lieutenant General Ralph Canine, who dominated early NSA policies and 
stamped his character on the Agency, had been a line Army officer with no intelligence 
experience until he became deputy assistant chief of staff for army intelligence in 1949. 
Prior to that he had been an artillery officer, with wide experience in combat (both world 
wars, serving under Patton in World War II) as well as logistics. Although he brought no 
technical education to cryptology, he exerted his influence through a hands-on 
management style. He was forceful and determined and tenaciously enforced the 
Brownell recommendations on the reluctant SCAs. His whimsical personality produced 
legions of "Canine stories," which simply embellished lis reputation as a maverick. 
Collins proclaimed him a "fortunate choice," and said that "he . . . raised the National 
Security Agency from a second-rate to a first-rate organization." 2 Canine was no diplomat, 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SYDTEMQ JOINTLY 
MOT R.F.T ,f f""^ nr^nyqiT T | V I I ' I f ,"| | T 



62 



DOCID: 3188691 




and he might have failed had he come along ten years later. In 1952, however, he was the 
right man for the job. 

One of the first things Canine did was to get rid of the triumvirate of service deputies 
who, under AFSA, had represented their own service interests rather than the interests of 
the central organization. He replaced them with a single vice-director, and named Joseph 
Wenger to fill the position. But Wenger was probably not very happy as the vice-director. 
By all contemporary accounts, Canine served as his own vice-director. He tended to make 
all key decisions himself. He had no patience with long vertical lines of control, and when 
he wanted an answer, he went directly to the person involved. He relied on his staff to 
keep others in the chain of command informed of hig comings and goings but did not feel 
bound, himself, to use the chain. The system smacked of paternalism, and one of Canine's 
subordinates once said, "Whenever I see him nowadays, I expect him to pat me on the 
head." 3 

Canine organized NSA rather like AFSA had been structured, with Production, 
COMSEC, and R&D being the major divisions. But he broke Administration into its 
component pieces (security, personnel, training, logistics, and plans and policy) and placed 
them on his "special staff," a classically army way of doing things. The office designation 
system was a trigraph, NSA followed by a dinome: for instance, NSA-02 was the Office of 
Operations. 

In February 1953 Canine changed Operations to Production, or NSA-06. Production 
was structured much like a factory, in which the parts of the cryptologic process were 
organized functionally rather than geographically. The major divisions within Production 
were Collection (NSA-60), Analysis (NSA-70), Machine Processing (NSA-80), and 
Exploitation (NSA-90). Although NSA has since changed over to a more geographical 
approach, the original organization more closely corresponded to how cryptologists viewed 
their profession at the time - as part of a complex process suitable primarily for highly 
skilled factory technicians. What made cryptology different from other intelligence 
disciplines was both the intricate technical challenge and the assembly-line processing 
system. It also represented NSA's way of conceptualizing the process of intelligence - as 
underlying data revealed through mathematical attack rather than as cognitive insight 
arrived at through inspiration. 4 



The Early Work Force 

The Korean War had ushered in a period of explosive growth in the cryptologic 
population. This was followed by a long period of fairly steady personnel growth, as Table 
1 shows. 



HANDLE VIA TALENT KEYHOLE OOMINT CONTROL SYSTEMS JOINTLY 

NOTR.F,T,E flfifl P Tg ' r "r'7nnrnTTTT i 'i n , 




DOCID: 3188691 S isi-so usc 4 03 

(b) (3) -IB USC 798 
(b) (3J-P.L. 86-36 




Table 1 

Cryptologic Population, 1949- 1960 5 

Year AFSA NSA Totals (includes SCAs) 

10,745 
33,010 
50,550 
72,560 



Dec 1949 4,139 

Dec 1952 8,760 

Nov 1956 10,380 

Nov 1960 12,120 



The work force in 1952 was double what it had been under AFSA, but it was\still 
smaller than either ASA or USAPSS and larger only than NSG. 



SI 



The Hoover Commission, which was probably 
the most extensive investigation of the federal bureaucracy ever, estimated that 
cryptologic costs amounted to about half a billion dollars. 7 

In the early days, the work force was about one-third military and two-thirds civilian. 
A snapshot of NSA's work force in 1956 (Table 2) showed most of the population working in 
Production, 

Pay tables were not quite as generous in those days, as Table 3 clearly shows. A grade 
5 employee (the most numerous group of NSA employees) started out making $3,410, 
which smacks of impoverishment. But with houses costing below $10,000, and frequently 
below $5,000, employees may have been just as well off in real terms then. 



HANDLE VIA TALENT KEYHOLE OOMIHT CONTROL QY3TEMB JOINTLY 
N O T RELE ACADLE TO FOREIGN NATIONALS 



j^EsecREruwHmA 



64 



DOCID: 3188691 



(b) (1) 

(b) (3J-P.L. 86-36 



\ ^Table 2 
NSA's Work Fprce by Organization, 1956 




Element 
Production 
R&D 

COMSEC 

Communications 
Training 

Directorate, 
admin, overseas 

Totals 



Table 3 

Pay grade allocations and salary (basic level) 1962 and 1993 8 
Grade Salary 1952 1993\ Grade Alloc 1952 1993 



1 


$2,500 


$11,90^ 




;p.2%) 




;o%) 


2 


2,750 


13,382; 




;6 ? 7) 




:o.o7) 


3 


2,950 


14,603\ 




[635) 




[0.5) 


4 


3,175 


16,393 \ 




13^ 




0.7) 


5 


3,410 


18,340 \ 




[26) \ 




:i.9) 


6 


• 3,795 


20,443 \ 




\ 




:i.6) 


7 


4,205 


22,717 \ 




[18) \ 




:4.9) 


8 


4,620 


25,259 \ 




[1-5) \ 




l) 


9 


5,060 


27,789 




[12) 




[6.8) 


10 


. 5,500 


30,603 




[0.5) 




[0.2) 


11 


5,940 


33,623 




[7) 




[12.1) 


12 


7,040 


40,298 




[4) 




[22.1) 


13 


8,360 


47,920 




[2) 




(26) 


14 


9,600 


56,627 




(0.8) 




(11.5) 


15 


10,800 


66,609 




(0.6) 




(6) 


16 


12,000 






(.02) 






17 


13,000 






(.02) 




2) 


18 


14,800 





















■ HANDLE VIA TALENT KEYHOLE OOMINT CONTROL 0Y0TEM0 JOINTLY 
TSfOT BET TT frSABLE TO FOItEION UATIONAUS 



65 TQE-S€CI?bT UPnBRA 



DOCID: 3188691 

TQB-SEOtfr UMBRA 



Included in Table 3 are the grade allocations in 1952 compared with those in 1993. 
This is a striking illustration of grade creep - more of a gallop than a creep. In 1952 the 
average grade was 6.7, while in 1993 it was 11.7, a grade inflation averaging fully five 
General Schedule grades over a period of forty-one years. This followed the trends in the 
general federal work force: in 1952, the average grade was GS-5.5, while in 1993 it was 
GS-9. 

The conditions under which NSA employees labored were not much different from the 
AFSA days. Offices were badly overcrowded, especially at Arlington Hall. In 1954 
approximately 30 percent of the work force worked the evening shift to relieve 
overcrowding on days. Air conditioning in the Washington area was still virtually 
unknown, and the NSA hot weather policy permitted relief from work only when 
conditions became fairly unbearable, as the temperature versus humidity chart (Table 4) 
shows. On really hot days the man whirling the hygrometer was the most popular person 
at the station. 

Table 4 

NSA Employees Could be Released When 

Temperature reached And humidity reached 

95 55 

96 52 

97 49 

98 .45 

99 42 
100 38 



There was a view, widely held in 1952, that the expertise of the civilian work force had 
declined since 1945. This was to some extent true. Not only had ASA and NSG lost some 
of their best minds at the end of the war, but the structure of the central organization 
created built-in problems for the civilian promotion system. The Navy had always run its 
cryptologic service with military officers, while the Army, believing that military officers 
rotated too frequently, had let its civilian work force run the cryptologic effort. By 1949, 
when AFSA was formed, NSG had a number of very senior officers involved in the 
business, and many of those people transferred into AFSA. Admiral Stone placed them in 
the key leadership positions, and the Army civilians were often shunted aside. Moreover, 
Stone took no steps to create a senior civilian work force, and when he departed in favor of 
Canine, there were no civilians above grade 15. 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SYSTEMS JOINTLY 
MOT RELEACADLE TO FOREIGN - NATIONALS 




DOCID: 3188691 




In 1953 a committee chaired by H. P. Robertson of California Institute of Technology 
(more commonly referred to simply as Cal Tech; see p. 227) looked at NSA's future and 
concluded that there was no future if the Agency was unable to obtain and retain 
outstanding civilians in various technical fields. This, according to Robertson, would 
require the establishment of a cryptologic career management program within NSA, with 
regular progression through the grade ranks and supergrade promotions to the top 
performers. The Robertson Committee also concluded that the services would have to 
improve their own cryptologic career advancement programs to attract and retain good 
uniformed people to COMINT. Robertson noted the lack of such a program in the Army and 
the lack of a stateside rotational base. (At the time, fully 66 percent of all ASAers were 
overseas.) 9 

Canine met this problem head-on. Soon after the Robertson Report was released, he 
directed the personnel office to begin working on a cryptologic career system, with 
technical specialties and a system of regular advancement. This work was well under way 
by early 1954 and eventually led to the structuring of the current cryptologic career 
program for civilians. Canine was credited personally with getting NSA's first three 
supergrades: William Friedman, Abraham Sinkov, and Solomon Kullback. (Frank 
Rowlett, hired in 1930 with Sinkov and Kullback, had joined CIA and so was not on the 
list.) Even more significant, in 1953 he obtained for NSA the authority to hire under the 
so-called Civil Service Rule Schedule A, which permitted NSA to hire without obtaining 
permission from the Civil Service Commission. Rather than having NSA applicants take 
the standard Civil Service test and then having a board interview the top three scorers 
NSA devised its own peculiar aptitude tests, and hired without outside interference. 10 

Under Canine, NSA moved in many directions at once to strengthen its civilian work 
force. The director got NSA a slot at the National War College in 1953, and Louis Tordella 
was the first appointment, Abraham Sinkov the second. 11 The Training Division initiated 
a presupervisory training program, which was curtailed in 1955 in favor of an intern 
training program oriented more toward technical education. 12 NSA began local recruiting 
in the Baltimore and Washington areas by 1954. 13 



Fielding the Field Offices 

Canine moved very aggressively to establish field offices. Under Stone, AFSA had had 
no field organization, and the censorial AFSAC appeared to guarantee continuation of the 
situation. But as soon as he became AFSA director, Canine made an end-run around 
AFSAC. On a trip to the Far East in September of 1951, he got the concurrence of the 
theater commander for an AFSA field office and returned to Washington with a fait 
accompli. Early objections by NSG were muffled when Canine named Captain Wesley A. 
("Ham") Wright, one of the most senior naval cryptologists, to head the newly formed 
AFSA Far East office in Tokyo. By the time AFSAC got around to considering this 



HANDLE VIA TALENT KEYIIOLE.COMINT CONTROL 0Y0TEM0 JOINTLY 
NOT RELEASADLE TO FOREIGN NATIONALS 



67 TO£SKffETUMlBRA 



DOCID: 3188691 



•■'(b) (1) 
(b) (3J-P.L. 86-36 
(b) (3)-50 USC 403 



TiJMfCREfuj^RA 

surreptitious move in January of 1952, the office already existed (official date: 1 January 
1952) with Wright and a staff of six. When APSAC approved a formal charter, it stripped 
Wright of any direct control over SCA field operations, but Canine had the nucleus of a 
field organization and awaited only the creation of NSA to, augment the authorities of the 
chief. 

In Europe, Canine began by sending a top civilian, Hugh Erskine, on a survey trip, the 
result of which, as in the Far East, was theater command concurrence with an APSA 
branch office. This time Canine submitted his plan to AFSAC before officially 
establishing the office. AFSAC approved, and Erskine began work formally on 1 
September 1952 in offices in the I.G. Farben building in Frankfurt. 14 NSAEUR competed 
for a time with an office titled NSAUK (NSA United Kingdom), located in London, and the 
two shared responsibility for some of the continental COMINT functions - for instance, 

This lasted until 1956, when NSAUK was abruptly 



disestablished. 

When CINCEUR shifted to Paris in 1954, NSAEUR stayed in Frankfurt but finally 
shifted to Car np des Loges, outside Paris, in 1963. While the policy and liaison functions 
resided there, 



1 5 

Once NSA was officially established, Canine moved swiftly to create more field offices. 
NSA Alaska (NSAAL) was created in July 1953, NSAUK on 26 August 1953, and 
NSAPAC, established to advise CINCPAC, on 16 August 1954. He also created at home 
an office to monitor field operations. 16 

Backed by the authority of NSCID 9 (the predecessor of the present-day NSCID 6), 
Canine imposed on the reluctant SCAs a group of field offices that had basically the same 
power as he himself within their geographic spheres. They had two functions - liaison 
with theater commanders and technical control of the theater COMINT system. Their main 
reason for existence was to impose order on the chaotic growth of the field sites, and they 
established large and active technical staffs which worked directly with the sites. NSA 
field offices could task SCA field sites directly (although they customarily did not do so). 
NSA's theater chiefs strove to create a cooperative atmosphere with the SCAs, but 
everyone involved recognized the implied threat that they represented as personal 
emissaries of the feared Canine. The SCA field chiefs fought this "encroachment" into 
their territory with every resource at their disposal. 17 

During and after World War II, American military organization in the Atlantic and 
Pacific theaters contained inherent turf conflicts. In Europe, for instance, the main power 
resided with CINCEUR (originally in Frankfurt), but there was also a military 
organization in Great Britain that competed with it for power. In the Pacific the 
competition between CINC Far East (MacArthur) and CINCPAC (Nimitz) was even more 
stark. And so it was with NSA organizations. In Europe, the latent competition between 



HANDLE VIA TALENT KEYHOLE COMINT OONTItOL 3V3TEMB JOINTLY 
NOT BFIf Frt i S A RT K TO FOREIGN NATIONALO 



TOP5E€REf UM^RA 



68 



DOCID: 3188691 



(b) (1) 
(b) (3) 
OGA 



(b) (1) 

(b) (3)-50 USC 403 
(b) (3)-18 USC 798 
(b) (3)-P.L. 86-36 



(b) (1) 

(b) (3J-50 USC 403 
(b) (3J-P.L. 86-36 



the NSA offices in Gnkt Britain and Germany was resolved in 1956, but in ihe Far^ast 
the competition between the offices in Tokyo and Hawaii continued for manV years. 



Civilians in the Trenches - the Civop Program 

In the early 1950s ijfSA turned to the problem of field site collection. Military! operator 
turnover was high, some years as high as 85 percent. The long-range expansion of 
intercept positions set by JCS during the Korean War appeared to be a dead letterlunless a 
stable manpower pool jcould be established. NSA liked what it had seen of the GCHQ 
program of hiring civilian operators because of the exceptionally long retention rkes and 
NSA was also aware that CIA was hiring civilian operators for 
""Negotiations were begun with ASA, and in 1954 an agreement 

four 
NSA 



Was hammered out whiVh wnnld sW with a , nnol of on* h undred HviHan on R r fl f.nrg k 

ASA field sites " " 



would recruit ana train tne operators, who would be under ike control ol the fie/d site 
commander. For the initial group, rotation at all four bases was set at two years, and the 
grade ranges for the program were 5 through 11. The NSA planning group waxed a little 
poetic, formulating long-range plans for thousands of operators and an eventual NSA field 
site of its own. 

The trial group was duly recruited, trained, and deployed. But even as things were 
moving ahead, the services' attitudes were beginning to cool. NSA promised to recruit 
only operators who had retired from service, but ASA and USAFSS foresaw keen 
competition for their first-term operators contemplating better salaries doing the same job 
for NSA. By 1957 the services had turned against the program, and it was quietly 
discontinued. It had long-lasting beneficial results, however. It yielded, in later years, a 
cadre of experienced civilian operators who performed well in crisis after crisis. 18 



COMINT Reporting in Transition 

The reporting legacy of World War II was translations. ASA and NSG issued 
thousands of translations per month, a reflection of the huge volume of readable traffic. 
Once the cryptanalyst had finished his or her job, and the translator had put the message 
into readable English, the verbatim transcript was released to either G2 or the theater 
commander (in the case of the Army) or Office of Naval Intelligence or the appropriate 
naval commander (in the case of the Navy). The mechanism for this was to hand the 
information in raw form to an intelligence analyst collocated with the cryptologic 
organization. Traffic analytic information was also passed in bulk to the appropriate 



HANDLE VIA TALENT KEYHOLE COMJEJX-efiWTltOL SYSTEMS JOINTLY 
NOT REijASABraTfOFOHEIGN NATIONALS 



69 



TOPSgfSmWfSRA 



DOCID: 3188691 



JCOP4ECRET0MBRA 



intelligence organization, which would put it into readable intelligence. In other words, 
the COMINT factory simply passed raw information to the organization, which would itself 
put it in context. 

The postwar cryptologic community continued to produce primarily translations, 
accompanied by all the COM INT technical information 



necessary for the service intelligence analyst to analyze it. 



NSA was not supposed to analyze. The information (it could not be dignified with the term 
"report") lacked a serialization, resembling the modern system. [ ~ 



AFSA began to evolve a similar system. Releases tended more and more toward! I 
reporting rather than translations ^ ~\ Reports were morejf 

formal and had wider distribution. AFSA dev ised its own primit ive serial ization systemi! 



an example would be 



matter 



followed by a date. 



was the subjecif 



1950 by that section. But reports still contained] 



?.nd 13-50 indicated this was the thi rteenth report produced iiff 

£nd other\sorts of technical 



data later prohibited i n comint Reporting, and nar rative portions, were oftbnVery heavy on 
discussion of details of| J^er than on Vgher-leve^l information 



like unit movements. The distribution was stilKylyy Iimited ^y modWh standard! 
Collocated organizations (ASA, USAFSS, and NSG r'eple sentatives, for exkmple) decide^ 
who in their services should see the information and. made further distribution from 
there. 20 \ \ \ !( 



Early NSA reporting was more formal still; 



Distribution was broader as NSA ceased to rely on the SCA arid service iAt£lligenf:e/ 
collocated liaison offices to distribute further. Reports, in 1^ still W^ned fn 
I \had fina lly been expunged. There ivas sijM mufeh 1 / 



information |_ | but analytical .conclusions were novh 

separated into a "Comments" section at the end of the report. 21 Lat^r in\lS&3 N^A/ 
excluded "COMINT technical data" from product reports completely akd formed hU 
Operational Management Control Group to enforce discipline. Collateral information 
could be used when necessary. 22 

The COMINT reporter was often bedeviled by the same probleihs then as today 
Periodically NSA organizations would chastise reporters for overusing qualifiers like 
"possibly" and "probably." A 1953 memo found NSA reporting "generally so cluttered 



with qualifying expressions as to virtually preclude their use by a consumer 



>;23 



(b) (1) 

(b) (3) -50 USC 403 
(b) (3)-18 USC 798 
(b) (3) -P.I. 86-36 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SYSTEMS JOINTLY 
NOT RELEASADLE TO ' FOREIGN NATIONALS 



jQB^eeftEfuyBRA 



70 



(b) (1) 



DOCID: 3188691 



(b) (3)-P.L. 86-36 
(b) (3) -50 USC 403 
(b) (3)-18 USC 198 




IRA 



The National Security Agency 



was a term shop. 24 

In 1955 the Hoover Commission declared that NSA, while producing some very 
valuable information, was not an official member of the intelligence community. But the 
commission undercut this general statement by noting that the volume of COMINT was so 
huge that it could never all be turned over to consumers, and by the very act of selecting 
individual pieces for dissemination, NSA made analytic judgments about value and 
applicability. 25 

This trend was to continue and intensify. Key NSA executives knew that the 
organization had to move away from translations and into true intelligence reporting. 
Various sources of COMINT had to be synthesized, and the results must be packaged into a 
meaningful explanation of the situation. If possible, the reporter should make comments 
as to meaning and, on occasion, should make conclusions based on COMINT. This was a 
higher level of analysis than the rest of the intelligence community foresaw for NSA, and 
it would get the organization into trouble with consumers who resented what they 
regarded as turf encroachment. But it was the wave of the future. 

NSA Training - The Early Years 

Training had been the "bastard child" of AFSA. Originally the training school had 
been a section of the personnel office, a way station for new and uncleared personnel. New 
recruits were given unclassified Army traffic analysis and communications manuals to 
read until their clearances came through. The training was good - many of the manuals 
were written by Friedman himself - but the way AFSA treated the problem was all wrong. 
The staff was miniscule, facilities practically nonexistent, and the function was almost 
totally ignored. The real training concept was on-the-job training in the duty section. 
Almost all operations training was conducted in Production, with little centralized control 
and practically no classroom instruction. There was a training staff that tried to 
coordinate all this,. but it did not work in the same organization as the cryptologic school, 
which was still part of personnel. 28 

When the Korean War began, the training school was still in languid decay, with one 
hundred uncleared recruits reading musty traffic analysis manuals in the training spaces 
at Nebraska Avenue, supervised by a staff of six people. By the end of the year all was 



HANDLE VIA TALENT IUDYIIOLE OOMINT CONTROL 0Y0TEM0 JOINTLY 



71 




DOCID: 3188691 




chaos. There were 1,100 trainees jammed into the same spaces, still with a staff of 6. 
Canine was aware of the problem, and AFSA went to work to improve the situation. In 
April of 1951 the school was moved to larger quarters at 1436 U Street, N.W., designated 
Tempo R. In June 1954 the school moved to another World War II building - Tempo X - 
located on the north side of East Capitol Street, in the area that is now part of the RFK 
Stadium parking lot. When, in the mid-1950s, NSA moved to Fort Meade, the training 
school moved to a former hospital a couple of miles from the main NSA complex. 

Canine later separated training from the Office of Personnel and elevated it to the 
level of Office of Training. Its chief was named commandant of the NSA School. Canine 
was also a proponent of management training, which was begun in 1952, and he placed the 
first NSA students in service war colleges in 1953. 

AFSA also began paying more attention to formal classroom instruction. Instead of 
the "sit in the corner and read a book" approach, it began offering a selection of classroom 
traffic analysis, cryptanalysis, mathematics, language, and technical training. By 1952 
the school was offering training (at some level, at least) in eighteen different languages. 
Secretaries got instruction in clerical and stenographic skills, and there was a four-week 
teletype operators course for those assigned to communications. There was also a one- 
week indoctrination course for all new hires, with follow-on instruction for certain 
specialties. 27 By mid-1952 AFSA was also offering three levels of management training - 
junior (presupervisory), supervisor, and executive. Classes were very small, but at least a 
rudimentary program existed. 

NSA also began using education as inducement. Begun under AFSA, the College 
Contract Program began with a contract with George Washington University and 
amounted to NSA payment of tuition to qualifiers. Classes were held at Arlington Hall, 
Nebraska Avenue in the District, and at Thomas Jefferson Junior High School in Virginia.' 
There was also a program for graduate students and, for a select few,, a fellowship program 
which offered full-time study away from NSA. 

NSA's role in broader cryptologic training within the services was less certain. Both 
AFSA and NSA enjoyed a theoretical technical control of cryptologic standards, which 
included training, but AFSA never exercised its review function. An early AFSA proposal 
to create a consolidated cryptologic training school was scuttled by Brigadier General Roy 
Lynn, an AFSA deputy director, who was concerned about retaining USAF Security 
Service independence. 

After 1952, things began to change as NSA became active in reviewing SCA 
cryptologic courses. The Agency was especially active in providing technical assistance for 
language training and at one time took responsibility for all language training beyond the 
basic level. It did not, however, try to take on COMSEC training, preferring to leave that to 
the SCAs. 




HANDLE VIA TALENT KEYHOLE COMINT CONTROL 0Y0TEMB JOINTLY 
„ NOT RBLEASADLE TO FOREIGN NATIONALS 



72 



DOCID: 3188691 




Canine continued to strengthen the organizational position of the training function. 
As it migrated up from branch to division level, it took on added responsibilities and 
acquired more resources. The people who were involved in training in those early days 
were first rate - Lambros D. Callimahos (a close protege of Friedman) and Navy captain 
Thomas "Tommy" Dyer (one of the Navy's great pioneers in codebreaking) were especially 
notable examples. William Friedman, who had personally built the Army's cryptanalytic 
system, spent much of his career as a teacher and authored many textbooks on 
cryptanalysis. With such talent and influence, it was only a matter of time before NSA's 
training system became a model. 

Setting Up Security 

Security was one area with which Canine had experience, and he tackled it very early. 
Under AFSA, perimeter guards at Arlington Hall and Nebraska Avenue had been 
uncleared. Interior guard duty was pulled on a rotating basis by reluctant uniformed 
cryptologists, each division taking its turn for a month at a time. Canine eliminated the 
interior guard duty in early 1952 by bringing in cleared, uniformed security police. Later 
he decided to add some prestige to the NSA guard force and convinced the Navy to give up 
a detachment of Marine guards to begin guarding the new temporary NSA facilities at 
Fort Meade in 1955. Normally reserved for embassy duty, the Marine guard detachment 
became a fixture and source of pride at NSA for many years. 28 

Given the size of the cryptologic complex in Washington, some sort of universal 
personnel identification system became necessary. The Army appears to have begun using 
personnel badges during World War II. Their badges in those days were round metal tabs 
with a picture overlayed with plastic - fully cleared people had red badges, opposite the 
system of today. After a costly experiment with glass badges, AFSA settled on a plastic 
badge. Color coding identified organization, with seven colors total. In 1956 the 
organizational affiliation began to fade as NSA reduced the number of colors for cleared 
people to four and began using green badges for fully cleared employees. Metal- badges 
returned in 1959 and were standard until the late 1970s. NSA employees found them ideal 
for scraping ice off windshields. 29 

Along with a badge system, NSA began restricting area access. By 1953 the security 
division had devised three work area designations: restricted, secure, and exclusion. The 
"red seal" and "blue seal" tabs used for so many years to designate compartmented areas 
did not, however, come into use until NSA moved to its new quarters at Fort Meade in 
1957. 30 

NSA's controversial experiment in polygraph screening was rooted in the Korean War. 
As new employees flooded into the training school at Nebraska Avenue, the security 
system was overwhelmed with clearance requirements. Then, as now, employees were 
cleared through a combination of the National Agency Check and background 

HANDLE VIA TALENT KEYHOLE OOMINT CONTROL 0Y0TEM3 JOINTLY 
MOT RELEA S ABLE TO FOItEION MATIONAL3 — 



73 TORSeCRET UMBRA 



DOCID: 3188691 



■ TOP SCCftCI UMBRA " 

investigations, conducted by the services. By December 1950 the system was so inundated 
that 39 percent of AFSA employees were uncleared. NSA security people began casting 
about for a quick way to process clearances and fastened their attention on the polygraph, 
long used by law enforcement agencies in criminal investigations. Although polygraphs 
were not admissable in court, AFSA discovered that CIA had begun using them for people 
being indoctrinated for COMINT as early as 1948 and only two months earlier, had 
broadened testing to include the entire CIA work force. 31 Studies showed it to be a more 
reliable indicator of loyalty than the background investigation, and it was proposed that 
the polygraph be tried as a way to get an "interim" clearance. Canine approved a trial 
program in January 1951, but implementation was tricky. AFSA had to buy the 
equipment, recruit polygraph examiners from the police departments and private 
detective agencies around the country, build soundproof rooms for the interviews, and 
become experienced in interpreting results in this new and experimental area of loyalty 
verification. 

The new polygraph procedures began on a trial basis at the U Street location in May of 
1951. Soon examiners were working from seven in the morning to eleven at night. By the 
end of September, they had cleared the backlog and went back to regular hours. AFSA had 
suddenly acquired hundreds of employees with something called a "temporary" clearance, 
who still required completion of the background investigation to become "permanent." 
But in the helter-skelter time of war, no one paid the slightest attention to the difference, 
and on the day NSA was created a large portion of the work force worked with a temporary 
clearance. This situation would come back to haunt NSA in 1960 when Martin and 
Mitchell fled to Moscow and NSA's clearance practices were called into question. (See p 
280.) 

In the rush to clear people, there was considerable breakage. Examiners were used to 
dealing with criminal investigations, and some of them had trouble making the transition. 
Hostile questions elicited emotional responses, and the rate of unresolved interviews 
approached 25 percent. The incredibly long hours added to the stress, and by the end of the 
first summer it was hard to tell who was more stressed, the examiners or the examinees. 
But after a very bumpy start, things smoothed out, and the security organization claimed 
to have cleared up lingering administrative problems by 1953. 

When first begun, the polygraph was "voluntary," but Canine declared that if an 
applicant did not volunteer, the application went no further. The fiction of optional 
polygraphs continued until 6 December 1953, after that historic date all applicants were 
polygraphed. But there were always exceptions to the general rule that all employees 
were polygraphed. No requirement was established to include existing employees in the 
system, and the military, amid much controversy, refused to allow its people to be 
polygraphed. 32 

The modern (and usually functional, if somewhat cranky) classified waste disposal 
system of the 1990s was a good deal less high-tech in 1952. Early destruction at both 




DOCID: 3188691 



jqmecKetuJ 




BRA 



Arlington Hall and Nebraska Avenue was by incineration. Burnbags were stapled shut, 
as they are today, were marked with the originators' organization, and were placed in 
central collection locations. Once picked up, they were pitched into the fire by a military 
detail, and destruction was certified by a commissioned officer. 

In late 1951 AFSA, determined to modernize the procedure, ordered two Somat 
machines, which AFSA officials had seen in operation at CIA. The machines operated 
much like the present destruction facility but on a much smaller scale. There was a 
whirling tub resembling a cement mixer, into which the burnbags were thrown. The door 
was then closed, water was injected, and the tub churned. But the early models did not 
work very well, and the whole process was as dirty as a paper mill. NSA later returned to 
the old standby incinerator until something better could be devised. 33 



NSA AND THE U.S. INTELLIGENCE SYSTEM 

NSA and its director were coping with the problems - technical, organizational, and 
fiscal - in establishing a truly global SIGINT system, which at one and the same time would 
serve national and parochial interests. This required a strong central institution and 
considerable adjustment of the old ways of doing business. When Canine tried to make the 
adjustments, he ran into opposition from every direction. His attempts to impose 
uniformity were opposed by the SCAs, while his SIGINT turf was simultaneously being 
invaded by the CIA. 

Consumer Groups Come to NSA 

The modern method of marketing SIGINT is primarily through Cryptologic Support 
Groups (CSGs) accredited to consumer organizations. Many NSAers are surprised that it 
was not always such. But in fact, the system began exactly opposite. In the beginning, 
consumers established liaison detachments (sometimes referred to as "beachheads") 
within NSA. Indeed, NSCID 9 codified what already existed in AFSA when it stated that 
"the Director shall make provision for participation by representatives of each of the 
departments and agencies eligible to receive COMINT products in those offices of NSA 
where priorities of intercept and processing are finally planned." The motivating force 
appears to have been to give customers a voice in setting COMINT collection and reporting 
priorities. But the customers did not limit themselves to expressing requirements. All of 
them sifted COMINT information and interpreted the meaning back to their parent 
organizations. Some of them actually produced their own report series and distributed 
them to their home offices. 

In the beginning, many of these organizations were quite large and robust: in 1954 
both Army and Office of Naval Intelligence had fifty-two analysts at NSA, CIA had 



HANDLE VIA TALENT KEYHOLE CJ 




»L SYSTEMS JOINTLY 




75 



RA 



DOCID: 



3188691 

_TQE ^FfRrT 1 HWBR7T 



(b) U) 
(b) (3) 
OGA 



and State ha d four. Air Force Security Service, however, had by far the 

largest, a total of eighty-one analysts working in an outfit called AFSSOP (Air Force 
Security Service Office of Production), which produced COMINT summaries digested from 
the mass of technical information available only at NSA headquarters. 

NSA did not like the system, and over the years it made moves to cut off the flow of 
technical information that kept the consumer groups alive. These attempts were initially 
unsuccessful, but the beachheads gradually became smaller and finally faded out of 
existence, victims of an aggressive NSA external reporting program that made them 
unnecessary. By the end of the 1950s they were gone, except for liaison detachments that 
had no production or interpretive responsibilities. 34 

The Struggle for Technical Control 

NSCID 9 gave NSA "operational and technical control" of all U.S. COMINT operations. 
This revolutionary authority proved to be the glue that knit the COMINT community 
together. 

Those who have lived within a unified system all their working lives cannot appreciate 
the technical problems that confronted NSA in November 1952. For instance, among the 
British, Army, and Navy, there were in the 1940s seven different naming conventions for 
Soviet codes and ciphers. 



The Navy began the Second World War usingT 



The British began withj 



The Army began with 



• ^ The Navv copied Soviet intercept. 



|while the Army used sin'' 



The British were copying thing; 



1 



Each organization had its own traffic formats. When the traffic cake into NSA, itftl 
had to be hand-massaged to make it suitable for any sort of" processing A coordin Jed 
attack on high-grade systems would be too time-intensive without sta^idardizatipfi. 35 
Someone had to dictate formats. 

The impetus behind standardization was processing. Raw traffic and digested extracts 
(called TECSUMs, or technical summaries) cascaded into NSA headquarters in 
unmanageable volumes. An NSA Technical Management Board created soon Me/ NSA 



HANDLE VIA TALENT KEY^OLEC0MIN^CilW¥R9nS7SraMSJOINTLY 
NOTMLJl4*«fcErT^F6REIGN NATIONALS 



(b) (1) 

(b) (3)-P.L, 86-36 
(b) (3) -50 USC 403 
!b) (3) -18 USC 798 



TOPJjEGRETIJIvTbRA 



76 



DOCID: 3188691 



itself was established concluded that collection, and thus collection equipment, would have 
to be homogenized to permit NSA to process the traffic. 

The original vehicle for securing compliance was a program of NSA circulars. They 
covered procedures for intercept, traffic forwarding, end product reporting, and services 
and facilities. In addition, NSA published Unit Operations Orders describing in general 
terms the mission of each unit authorized to produce COMINT. These publications, when 
taken together, constituted the NSA Field Operating Manual, a device borrowed directly 
from Army usage. Canine regarded them as directive, and he tenaciously enforced 
compliance, but the SCAs resisted. They initially regarded NSA directives as voluntary 
suggestions. 36 

By 1956 the SCA units were having trouble distinguishing operating policy from 
technical guidance, which had over the preceding four years become hopelessly scrambled 
between the two categories of documents. So NSA created a new system that looked a lot 
less like an Army directive, called MUSCO (Manual of U.S. COMINT Operations). Within 
two years ELINT had been added to the national cryptologic mission, and MUSCO was 
changed again, to MUSSO (Manual of U.S. SIGINT operations). On those occasions when a 
consumer needed to know how SIGINT was produced or what NSA's operating policy was, a 
special series of MUSSO documents called INFOCONS was issued. 37 

In April 1954, Canine unceremoniously yanked control of field site placement away 
from the SCAs. Henceforth, the establishment of field sites would be done only with the 
permission of the director. Even site surveys had to be coordinated with NSA first. Canine 
relented to the extent of allowing SCAs to place small (less than ten-position) sites during 
peacetime without his direct "chop." The important message, however, was that DIRNSA 
had now delegated this authority, implying rather directly that what he delegated he 
could rescind. 38 

And while he was at it, the director pushed the concept, completely foreign to the 
SCAs, of cross-servicing, whereby targets would be collected by the most technically 
capable intercept site regardless of service affiliation. During the Korean War, for 
instance, ASA sites collected a good deal of North Korean air force communications under 
the cross-servicing concept (and to the loudly voiced complaints of USAFSS). 39 

NSCID 9 gave the director untrammeled authority over COMINT direct support 
resources. A theater commander could request such support, but it was entirely up to 
DIRNSA whether the request was honored or not. Canine's directive on control of direct 
support assets narrowly defined the conditions under which the director would delegate 
control. When and if he did, it would normally be to the SCA chief, not an "unlettered" 
field commander. There were no provisions for appeal should DIRNSA deny the request. 
This provision of DIRNSA's authority stood basically unchallenged through the 1950s, a 
time when there was very little direct tactical support to be done, anyway. It did not 
become an issue until the advent of the war in Vietnam. 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL DYDTBMO JOINTLY 
NOT B i FiLFftSftBLB TO FOREIGN NATIOWALO 




DOCID: 3188691 

TO^SKffinjM^RA 

Having destroyed the prerogatives of the arm ed services, Canine, barely a month 
later, released control o f two ASA tactical units, 



(b)(1) 

j(b) (3)-50 USC 403 
|(b) (3) -18 USC 798 
1(b) (3)-P.l. 86-36 



ltd the commanding general of ASA. He made it plain, however, 

that these units were being released solely at his sufferance and pointedly reserved the 
right to task them temporarily or withdraw them completely for national tasking, at any 
time. 40 

In 1955, Canine decreed that new types of field site equipment would henceforth 
require NSA coordination. In a letter to the three SCA chiefs, he stated that NSA would 
establish standards for facilities and equipment, manning and staffing factors, site 
surveys, and operational procedures. NSA set up a large and aggressive R&D program to 
work out equipment and facility standards. The people and equipment for this effort had 
been inherited from ASA and NSG, though in San Antonio AFSS clung to its own R&D 
organization and was more independent in this respect than the other two services.* 1 

The Decentralization Plan 

While Canine moved to secure unchallenged authority over COMINT, he began, almost 
simultaneously, a parallel and apparently opposite program called "decentralization." 
The objectiv e of the program was to improve the speed of delivery of COMINT information to 
consumers. 



The issue had been pushed hard by General 

Hoyt Vandenberg when he had been Chief of Staff of the Air Force. Vandenberg had 
wanted to make COMINT the basis for an independent Air Force intelligence component to 
back up the strategic force. Security Service and Air Force intelligence officials insisted on 
direct support and, in a series of conferences with NSA in the summer and fall of 1953, 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 3Y3TEM3 JOINTLY 
NOT RKI . EASABLE TO FOREIGN NATIONAE g— 




DOCID: 3188691 



TQ&SeCRETU^RA 

hammered out an agreement which resulted in NSA turning on a flow of high-precedence 
reports to both commands. This first included reporting from NSA but soon devolved on 
both field units and AFSCC. By 1954 NSA had reluctantly delegated analysis and 



reporting on th e) I problem to AFSCC, and it became the key 

player in COMINT warning to Air Force commands, a virtual third echelon competitor to 
NSA. 44 ° . 

When the decentralization plan was officially launched in August 1954, it looked like 
planned.engine thrust reversal. Under it, NSA assigned specific COMINT problems to 
specified field sites. The criteria for assignment were perishabilty, collectability, and 




HANDLE VIA TALENT KEYHOLE COMINT CONTROL 3YBTEM3 JOINTLY 
WOT RELEASABLE TO FOIIEIQN NATIONALS 




DOCID: 3188691 




IRA 



Relations with the SCAs 

By the mid-1950s, Canine basically had what he wanted - unrestrained authority over ! 
the entire Defense COMINT system (with a single exception which will be discussed below).) 
But it had not been a cost-free victory. Relations with all three SCAs were strained to aj 
greater or lesser degree. 

The relationship with ASA was probably the best. ASA and NSA came to agreement 
on key issues such as decentralization and release of operational control to direct suppori 
resources somewhat earlier than the other two services. ASA was of a mind to play the 
centralization game with NSA "straight up" and gained considerable good will as a result, 
occasional complaints from ASA field offices about "meddling" by NSA field officek 
notwithstanding. 



Regarding naval COMINT, Canine and the Navy were speaking a different language. 
That they did not get into as many battles as NSA and the Air Force one can probably 
ascribe to the fact that most of the time they were simply speaking past each other. \ I 



(b) (3)-50 USC 403 
(b) (3)-18 USC 798 
(b) (3)-P.L. 86-36 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SYSTEMS JOINTLY 
NOT BELEABADLB TO FOREIGN NATIONALS 




80 



DOCID: 3188691 




Canine thought that Navy COMINT was organized like Army and Air Force COMINT, but 
this was not the case. The Navy had no integral cryptologic command akin to ASA or 
AFSS. Navy COMlNTcame under naval communications (OP-20), and fixed field sites were 
generally assigned to naval communications organizations for administrative and 
organizational matters. Naval afloat detachments were instruments of the fleet 
commander, not NSG. Certain central functions were performed at Nebraska Avenue by 
Naval Security Group, but it did not have the same, authorities as its counterparts at 
Arlington Hall and Kelly AFB. In 1955, a frustrated Captain Jack Holtwick penned a 
lengthy memo bemoaning the difficulty that Canine was having with naval COMINT. 




Captain Jack Holtwick 
A highly influential naval cryptanaiyst, Holtwick occupied 
key positions in the early NSA organization. 

For more than ten years, people . . . have been talking about something which has never really 

existed as an entity, namely the Navy Cryptologic Agency These organizations [speaking of 

all Navy COMINT organizations] were an entity only insofar as they were engaged in the same 
trade and mutually complemented one another in it. They have never had a legal cryptologic 
organizational head, let alone a functional commander. Their lowest common superior was and 
is the Chief of Naval Operations 48 



HANDLE VIA TALENT KEYHOLE OOMIHT CONTROL OYOTEMO JOINTLY 
NOT RBLEAOADLE TO FOREIGN NATIONALS 




DOCID: 



3188691 

TQMKRfTUMtfRA 



-T 

By 1956, however, Canine apparently understood enough of Navy COMINT 
organization to object to its entire philosophy. He took aim at the subordination of NSGi 
detachment commanders to naval communications: "This is an unsatisfactoryj 
arrangement; there is always a conflict of basic interests in the direction of the units. The; 
superior officers in the chain of command ... are primarily concerned with general service' 

communications; they are generally inexperienced in COMINT functions " He related 

the submersion of Navy COMINT to Navy communications with SCA position totals, in thai 
from 1953 to 1956 NSG grew by only 7 percent, while ASA expanded by 380 percent an<J 
AFSS by 410 percent. This, he contended, resulted from deficient naval COMINT 
organization. 50 j 

In contrast to NSG, AFSS growth was breathtaking. From a tiny cadre of 156 peopi 
in 1948, AFSS grew to 23,128 people by the end of 1960. The command had over l,0(jo 
positions, a budget of more than $26 million, and it had surged ahead of both. ASA arid 
NSG on all counts in only twelve years. 51 

NSA's relations with AFSS, however, were the worst of the three. Although COMsk 
relations were smooth, COMINT was not. Under the hollow gaze of AFSA, AFSS hkd 
virtually seceded from th e COMINT community, carryin g its entire field site list with it. I It 
had called the field sitesl ^ so as to exempt them from AF$A 



tasking. (Major General John Morrison [USAF], a former NSA assistant director for 
production, once said that j k ith very isolated exceptions, were 

about as l k.the Eifel Tower.") 52 Canine's dicta onpperational and technical control 



■ l ... ' uii.vpoiauuHar aiiu LCUUUCai COHDrOl 

were intended largely.to corral the errant AFSS resources. This was effective but did Lot 
make AFSS very happy. I 

The biggest row of the decade. was over the Air Force Special X Communications Center 
(AFSCC). Officially created in July 1953 as the 6901st Special" Communications Center, 
AFSCC was intended as a third echelon processing center to satisfy Air Force desire^ for 
an indigenous Air Force COMINT center. The organization picked tip such miscellaneous 
functions as the SSO system and the USAFSS training school but wasintended all along 
as an analytical center and began functioning as one from its very first: day of existence. 
Canine had said "No" to the Air Force plan but lost the battle: In January 1&54 he ga^e up 
and, under the aegis of the decentralization plan, AFSCC acquired tni, mission of 
processing and reporting on th q [ To tins nucleusWs a4ded, 

over the years, virtually .the entir e | |as well as, beginning in%96i, the 



" Relationships continued to de$eriorate^>ii5;;by ; the end 



HANDLE VIA TALENT ICETIIOLE COMIWT COUTItOL DY3TEM3 JOINTLY 
NOT ffflT i Fi a S O BTTCTO FOREIGN NATIONALO 

JilMKRfrUR^RA 82 



(b) (1) 

(b) (3) -50 USC 403 
(b) (3) -18 USC 798 
(b) (3)-P.l. 86-36 



DOCID: 3188691 




RA 



of his term as DIRNSA, it was rumored that Canine, was barely on speaking terms with the 
AFSS commander, Major General Hunt Bassett. 54 



The SCAs Create Second Echelons 

The decentralization plan spawned a second concept,! | 

. \ frequently wound up 

controlling related intercept positions at smaller units. The arrangement amounted to a 
de facto layering system in which large units controlled operations at smaller units, and in 
some cases the smaller units were officially subordinated to the larger ones. The 
intermediate tier came to be known as "second-echelon," while NSA (and in the Air Force, 
AFSCC) operations were called "third echelon." 



(b) (3)-50 USC 403 
(b) (3)-18 USC 798 
lb) (3)-P.L. 86-36 



HANDLE VIA TALBOT KEYHOLE COMINT CONTROL SYSTEMS JOINTLY 
TVffvr RKi a o a m Ti"rm ir - mii im a m 



83 




DOCID: 



3188691 




DOCID: 3188691 



T9B*KfffF^We(BRA 



All three services created administrative units to supervise theater intercept sites, 
and to serve a liaison function with the supported commander(s). However, they all 
showed a disinclination to combine operational and administrative functions in the same 
organization, believing those to be separate tasks. 58 

Watching the Watchers 

DIRNSA's supervisor was not really the secretary of defense, despite what the Truman 
Memorandum said. In 1953 the secretary of defense assigned that job to General Graves 
B. Erskine, a Marine Corps four-star who was already assigned to his staff as head of the 
Office of Special Operations. Erskine monitored the CIA budget, which was hidden in the 
DoD budget, and after July 1953 he also monitored NSA. His deputy, Air Force colonel 
Edward Lansdale, later became famous as the author of covert actions projects in both the 
Philippines and Vietnam. 

The monitoring that Erskine did was rather loose. He always retained professional 
cryptologists on his staff to work the details of cryptologic money, and under such a 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 8Y3TBM3 JOINTLY 
WOT gffl i EASABLE TO FOItEION NATIONALS 

85 T9B*ECR6TUiy^RA 



3188691 



TOP SECRET UMUKA 

system, oversight was not detailed. Occasionally a big-ticket item would come up, like 
LIGHTNING (see p. 204), and Erskine's office would become involved. But Congress bad not 
yet instituted an effective review of the intelligence agencies (and did not until the mid- 
1970s), and CIA did not yet have the authority to ride herd on the finances of the DoD 
intelligence organizations. So by the standards of later days, no one was really paying 
much attention to the intricacies of NSA's money. 59 



NSA AND CIA -THE EARLY YEARS 

Will you please have the proper instructions issued discontinuing the cryptanalytical units in the 
offices of the Director of Censorship, the Federal Communications Commission and the Strategic 
Services, rf you are aware of any other agencies having services of this character, will you please 
have them discontinued also. 

Franklin D. Roosevelt, Memorandum for Director of Budget, 8 July 1942 

The origins of CIA were rooted in World War II. Roosevelt, under the pressure of 
wartime exigency, created an espionage agency in 1942, called the Office of Strategic 
Services (OSSI), under New York lawyer and World War I battlefield hero (winner of the 
Medal of Honor in France) William Donovan. Donovan's agency both collected and 
produced intelligence and mounted covert operations around the world. It was a mission 
that CIA was to inherit several years later. 

NSA's difficulties with CIA stemmed from decisions made in the 1940s, almost all of 
them bad. JCS, which owned most of America's intelligence assets, opposed OSS from the 
beginning and did everything in its power to deny to OSS the resources to do its job. The 
Joint Chiefs failed to keep OSS out of the HUMINT business, but in one area they succeeded 
almost totally: COMINT was denied. 

Roosevelt's order (above) resulted in the closure of a small OSS COMINT organization. 
Even worse, it was used by the JCS to deny to OSS access to ULTRA. Thus OSS reporting 
was crippled from the beginning. It had access to agent reports, photoreconaissance, POW 
and defector reports - everything, in short, but the most useful and reliable information. If 
World War II was, as has been claimed, a COMINT war, OSS remained on the intelligence 
sidelines. 60 

And it rankled. OSS seniors who later served in the higher ranks of CIA never 
accepted the JCS policy. The British intelligence services, which dealt closely with OSS, 
were appalled. Their own intelligence community was unified, and HUMINT was routinely 
integrated with COMINT in highly specialized offices, in order to reap full value from both. 
(For instance, Ian Fleming, a British naval officer and later author of some note, was 
responsible for the integration of Bletchley-produced ULTRA with the Navy's HUMINT and 



HANOLF. VIA TAI FWT TrFVTTOT IT rmtmw PnHTini nui ' UHU }IUk\ > \\\ y 
NOT RF,f |F[ A g A PT v Tn Prmnrr| TT r | n | |' fl L l ^ H 



TOP SECRET UMBRA 



86 



DOCID: 3188691 




special operations.) JCS had used security as justification for the denial of ULTRA to OSS, 
but the British were at least as security conscious as the Americans, and they seemed able 
to get COMINT of the highest sensitivity to those in the HUMINT business who needed it. 
The outright denial of ULTRA to OSS just did not make sense. 61 

Truman discontinued OSS immediately after the end of the war, partly to rid himself 
of Donovan, who was not in favor with the president. But within six months Truman once 
again had himself an intelligence organization, called the Central Intelligence Group. 
CIG was bedeviled by the same problems that submerged AFSA - lack of its own budget 
and personnel resources (people were loaned in from other intelligence organizations), 
absence of a congressional mandate, and lack of firm direction from the top. But the idea 
was the same as that of AFSA - to establish central control of U.S. intelligence operations. 
When CIA was created in 1947, succeeding CIG, it got its congressional mandate, its 
budget, and its own personnel. It still lacked firm leadership, but that was remedied in 
1950 with the appointment of General Walter Bedell Smith as DCI. Smith had been 
Eisenhower's chief of staff in Europe, and he knew how to run a tight ship. Tussling with 
"Beetle" Smith was like landing in a cactus patch. 

In the early days the only high-level COMINT available to CIG was a copy of the MAGIC 
Summary put out by the Army, which was available in the Pentagon. In the very early 
days, only fifty people in CIG had a COMINT clearance. But in June of 1946 Hoyt 
Vandenberg became DCI. Vandenberg was fresh from a tour as chairman of USCIB and 
knew the value of COMINT. In December he created an organization within CIG, called the 
Advisory Council, to deal with what he hoped would be a flood of COMINT reports. 

For a while there were few reports to disseminate. Requests for access to COMINT 
reports were generally denied. But in early 1947, two CIG organizations began to get 
involved with COMINT operations. The first was OSO (Office of Special Operations, the 
clandestine organization), which in March proposed to the Army and the Navy that they 
begin a Joint Counterintelligence Center (JCIC), using COMINT as the basic source of 
information. The services received this enthusiastically, and JCIC was established at 
Nebraska Avenue, with the understanding that it would eventually move to CIG. (It 
moved to CIA in 1949.) 

At about the same time, Colonel Robert Schukraft, chief of the Communications 
Division at CIG, was establishing a relationship with ASA. Schukraft had been a key 
figure in wartime Army COMINT and knew many of the peo ple involved in the COMINT 
business. He began a relationship with Frank Rowlett at ASA\ 




DOCID: 3188691 



/(b) (1) 
; (b) (3) 
OGA 



jopjEcnrruMPMr 



The operational aspects of these budding relationships eventually came under the 
aegis of OSO, and specifically one William ("Bill") Harvey, a former FBI agent who 
became legendary for his clandestine nnftratinnc iTnAa-r H n , m „ „ tt ,„ „ vor ;„ 1Qgn j 
COM1NT operational matters became centralizfidj \j- 



/(b) (1) 

/ (b) (3) -50 USC 403 
/ (b) (3) -18 USC 796 
: ' (b) (3)-P.L. 66-36 



Me anwhile, CIA requests for COMINT reports were still being Routinely turned down. 
But th e | Contributed to breaking 

^ logjam, ana ever larger volumes oi UUM1M' report series were forwarded to CIA. Once 
at CIA, the material was subdivided according to subject matter and farmed out to 
analysts through the auspices of the Advisory Council. CIA was determined to base 
reporting on all-source information, rather than to strictly segregate COMINT from all 
other sources. Of necessity, then, the number of CIA COMINT clearances rose rapidly, until 
by 1970 most intelligence analysts were cleared for the source. (See Table 5.) CIA policy 
stood in contrast to that of the Pentagon, which generally chose to compartment COMINT 
and to deal with two separate handling systems -COMINT and all other sources. 




DOCID: 3188691 



TOPSECRHHiraSRA 



(b) (1) 
(b) (3) 
OGA 



When AFSA was created, CIA made a pitch for a more active role in COMINT. Then- 
DCI Roscoe Hillenkoetter proposed that he should be given the chairmanship of USCIB 
but this was quickly overruled. CIA 



| k ut was being told in unmistakable fashion that they would 

remain on the sidelines when it came to the policy aspects of comint. That was still the 
domain of the JCS. 

CIA remained a major critic of comint throughout the AFSA period, and 
Hillenkoetter's successor, Walter bedell Smith, played an important role in getting the 
president to appoint the Brownell Committee. CIA was determined to get a bigger stake 
in the game. 

Smith got much of what he wanted from Brownell. He was made chairman of USCIB 
and, as such, could play a large role in COMINT policy. The results of the Brownell Report 
also gave CIA the chance to lean on the new NSA to get its own requirements satisfied. No 
longer would the civilians have to take a perpetual backseat to military requirements. 63 

CIA Enters the COMINT Business 

In the beginning, CIA probably did not intend to build its own crvptol ogic 
organization. Two very senior NSA officials, Louis Tordella andl |both 



HANDLE VIA TALENT KEYHOLE COMINJLCXWWTOTSYSTEMS JOINTLY 
NOT REL£ASABCETT<JPOMIGN NATIONALS 



89 



(b) (1) 

DOCID:. 3188691 !2S 

(b) (31-P.L. 86-36 



Tf7P c ,FrnFTiiMnnft- 



elosely in volved in the NSA-CIA relationship, categorically deny that t;his was the intent, 
himself described his first interview with Allen Dulles when he\ transferred from 



(b) (1) 
(b) (3) 
OGA 



NSA to CIA: "I mean Dulles put it flatly, we were not going into competition with NSA. 
We've got enough to do in CIA and we're not going to fragmentize [sic] our\efforts by going 
over there and starting a . . . COMINT organization. . . ." M But CIA Reeded certain 
information, and as long as cryptology remained the province of the Department of 
Defense, he felt it could not get its requirements satisfied. Smith decided to change things. 

The CIA Act of 1949 gav e the espionage agency the authority to expend what were 
called "discretionary funds;" 



|for...w.hich i the director would not have to answer to Congress in any detail 



According to Tordella, the PCI firiTusecl ""these moneys 



To a great extent this developed out of on-going CIA operatidtts; 




HANDLE VIA TALENT KEYHOLE COMIOT£QIIJR©t^YSTEMS JOINTLY 
NOT RELEASABfeBWJSREWN NATIONALS 



TOPSECReRJfflSKA" 



DOCID: 3188691 



_TOPSE£EEWM«Or 



(b) (1) 
(b) (3) 
DGA 





Mb) (1) 

i(b) (3) -50 USC 403 
i(b) (3)-P.L. 86-36 



DOC1D: 3188691 

TOP5ECRETTJl0iBRA~" 



!b) (I) 
(b) (3) 
OGA 



CIA and Cryptographic Materials 




TOPSECR 




HANDLE VIA TALENT KEYHOLE COMINT£0*m?OL SYSTEMS JOINTLY 
NOT RELEASABIJiSetfOREIGN NATIONALS 



92 



DOCID: 3188691 



/(b) (1) 

' (b) (31-50 USC 403 
(b) (3)-18 USC 798 
(b) (31-P.L. 86-36 



4(b) (1) 
(b) (3) 
OGA 




. i£ ri0 area did N SA and CIA clash more frequen#and with as much vigor/ as in | I 

L patters. There, NSCID 5 was in direct conflict with the" BRUSA Agreement 




half-dozen most lmporta^iEryptologists in America; had had a choppy relationship with 

jfelt that his own temperament was tooMethodical/for the hip- 



General Canine. 

shooting Canine, and the two were not getting along when/Canine, in/ a mood to 
reorganize, decreed that al l his seni ors would rotate jobs, An order td infuse the 
organization with new ideas. I f who had been working 4 COMINT, Was ordered to 

COMSEC.I Je 



"Twas joined by a small but experienced group of NSAers. i ncludingl 



was COMINT matters. 



whose province 



wno was well aware of the benefits of continued collaboration with the[ 

partners, brought some order into CIA's COMINT matters. 77 



1 



HANDLE VIA TALENT KEYHOLE COMINjrjMWTRoL SYSTEMS JOINTLY 
NOT RELEASABtSTrTFOREIGN NATIONALS 



93 




UMBRA 



DOCID: 3188691 



W (1) 

\p\ (3) -50 USC 403 
(b) (3) -18 USC 7 98 
IB) (3J-P.L. 86-36 



(b) (1) 
(b) (3) 
OGA 



DOCID: 3188691 



•(b) (1) 

(b) (3) -50 USC 403 
(b'i (3) -18 USC 798 
(b)\(3)-P.!. 86-36 




(b) (1) 
(b) (3) 
OGA 



DOCID: 3188691 



i(b) (1) 

(b) (3) -50 USC 403 
\b) (3) -IB USC 798 
fb) (3J-P.L. 86-36 



(b) (1) 
(b) (3) 
OGA 



DOCID: 3188691 



■(*) (i) - - 

(&} (3)-50 USC 403 
(b)\[3)-18 USC 798 
(b) (3)-P.L. 86-35 




DOCID: 3188691 



(b) (1) 
(b) (3) 

OGA 



"<b) (1) 

(B) (3)-50 USC 403 
(b\ (3)-18 USC 19B 
(b)'Mil-P.L. 86-36 



DOCID: 3188691 

TOPjECRePtJMBRA 



a. 



The Third Parties in the Early Years 




(b) (1) 

(b) (3)-50 USC 403 
(b) (3) -18 USC 198 
(b) (31-P.L. 86-36 



(b) (1) 
(b! (3) 

CGfl 



DOCID: 3188691 



'i(b) (1) 
|(b) (3) 

jOGA 



[ 0n its side > however, NSA also made mistakes. The most serious was in 
denying technical help to some of the more advanced Third Parties. This unyielding 
position often reduced CIA equities in other areas and damaged NSA's relationship with 
its senior intelligence partner. 



/ 



CIA in the NSA Trenches 

The most direct CIA involvement in NSA was a CIA-controlled analysis division 
which existed for the better part of six years. This strange story began with the Soviet 
explosion of an atomic bomb. 

When, in September of 1949, the Soviets exploded their first nuclear device, the eerie 
light from the explosion silhouetted a U.S. intelligence system in disarray. It had been 
CIA's job to follow Soviet nuclear technology, but JCS intelligence organizations gave CIA 
only lukewarm cooperation. The result was a National Intelligence Estimate (NIE), 
issued earlier in the year, featuring a wide variety of estimates of Soviet acquisition of 
effective nuclear technology, none of them even close to being accurate. / 



s 



As AFSA-246 became NSA-75, CIA turned more and more to direct action. In 1953, 
Canine and Loftus Becker, CIA's deputy director for intelligence, inked an agreement that 
turned management of the division over to CIA. It was captained by a CIA person, kept its , 
own database, did its own reporting, and even forwarded raw COMINT to CIA headquarters \ 
for further analysis. 




(b) ;i) 

(b) £3) -50 USC 403 
(b) (3)-lB USC 798 
(b) (31-P.L. 86-36 




DOCID: 3188691 



?(b) (i) 

(b) (3) 
OGA 



JSESECRePtTOfSRA" 



OPC 



In 1948 CIA, in cooperation with a Department of State organization called ~ 
(Office of Policy Coordination), began beaming .propaganda (sonie would say "n|ws") 
broadcasts toward the Soviet Bloc. The operation was called Vbice^f America, and it jlived 
a long and healthy life during the Cold War. Predictably, however, as soon as the jVOA 
stations went on the air, the Communist nations at which4hey were targetted bjegan 
jamming the broadcasts. Thus ensued, in February of 194$; yet another area of intense 
competition between CIA and the cryptologic community// I 

Tackling the problem of jamming would involve radip'monitoring. CIA took on tbje job 
in 1949 and immediately began preparing a plan to identify and locate the jammers 1 and 
devise a solution., in June 1950 an ad hoc group/of the IAC (Intelligence Advisory 
Committee chaired by the DCI) approved a preliminary monitoring plan, called 



Just how Admiral Stone of AFSA found out about it is not known, but it was hard to 
keep secrets at the IAC level. In any case, Stone contacted the Department of State (at the 
time OPC was still officially part of State/ather than CIA) in July of 1950 to let them 
know that he regarded this as an A^SA responsibility under NSCID 9. Hillenko|tter 
justified CIA activity to AFSAC as being performed under the section of the National 
Security Act that permitted CIA to perform "such additional services of common concern 
as the National Security Council determines can be more efficiently accomplished 
centrally. . . ." This was a weak reed, and Hillenkoetter made his case even less plausible 
by stating that monitoring facilities so established could be used for other purposes in time 
of war. Such a direct challenge to AFSA authority in COMINT brought a predictable 
AFSAC respon se, and in "N ovember USCIB took up the issue. USCIB conclude^ in 
November that | | was a COMINT mission and should be headed by AFSAj A 

USCIB study costed the problem at $5 million and 355 people. But when the matter vfent 
before the National Security Council in early 1951, CIA won. The NSC directed that CIA 
be the focal point/or a multi-agency attack on the jamming problem. 

AFSA wrote a supporting plan but continued to insist that it be given the mission. 
When Canine became director, he took forceful exception to CIA encr oachment in the 
situation. But Canine was handicapped by limited resources. | |;vas 



going to be expensive, and when the SCAs were polled, they offered only part-time DF 
facilities. NSA did not have the money to create a separate system just to monitor 
jamming, and the military services contended that they could not provide the 
communications to interlock a monitoring system anyway. So in February 1952 President 
Truman approved a plan for CIA to proceed on its own. 



TOPj£«mnviBRA 



HANDLE VIA TALENT KEYHOLE COMlNTjgQHIR6irS7STEMS JOINTLY 
NOT REiEASJABtirToT'o^IGNNATIONALS 



102 



DOCID: 3188691 



(b) (1) 
lb) (3) 
OGA 



Just what was ^ anyway? Jammers actually produced noncommunications 
signals, and the Army contended tha t they were E UNT, not COMINT. The entire subject of 
ELINT was in chaos at the. time $ and simply contributed to the disorder. The 



"services also saw electronic warfare applications, and they wanted their own people in the 
projected NSA-controlled| fcites to send EW-related information to their parent 



services. NSA feared this approach because it would spread COMiNT-related information 
outside codeword channels, and the services might turn the information into EW 
(electronic warfare) projects that would block COMINT hearability. This prompted NSA to 
appoint a committee to study the matter of jamming versus COMINT requirements. The 
confusion in definitions foreshadowed more serious divisions during the Vietnam era. 



_^This 



was a 



direct invasion of NSA's turf. 



In the mid-1950s, as 



schemes .emerged for the eventual institutionalization of 



continued along an inconclus ive course, various 

Most had as their 



central assumption that CIA would not continue in charge, and some placed NSA in 
control. Thy services wanted the mission but did not want to budget for it. One proposed 
plan would even have given the mission to the Federal Communications Commission. In 
late 1955, the secretary of defense put the matter to rest by decreeing that it was an elint 
mission and made the Air Force executive agent. The Air Force had only recently become 
executive agent for ELINT, and i t had a central EUNT processing center. Since no resources 
were allocated to dc | 



it became subsumed in the overall service ELINT mission. 



So in the end a separate monitoring system was not built. The jamming mission was 
handled as a corollary miss ion by the th ree SCAs, and when, in 1958, control of elint went 
to NSA, the threat posed by| vanished. 91 




DOCID: 3188691 



;(b) (l) 

(b) (3J-50 USC 403 
|b) (3) -18 USC 798 
('b) (3J-P.L. 86-36 



(b) (1) 
(b) (3) 
OGA 



DOCID: 3188691 



i(b) (1) 

= (b) (3) -50 USC 403 
5(b) (3J-18 USC 798 
f! (b) (3)-P.L. 86-36 



(b) (1) 
(b) [3) 
OGA 




In April 1956, after heavy rains caused interruptions in communications service in the 
East Zone, East German maintenance worker s discove red the taps and Unearthed the 
entire operation. In the space of a few hours, | | was shut down, and the acting 

commandant of the Soviet Berlin Garrison held a press conference on the /site of the 
" 'capitalist warmongers' expensive subterranean listening post.' " Now thajfc the whole 
world knew about ] | CIA could not continu j" [ for security- 

reasons. After April 1956, CIA sent an enormous volume of unprocessed channel hours 




HANDLE VIA TALENT KEYHOLE CQMINJ£G€WTEOL SYSTEMS JOINTLY 
NOT BEL£ASABEETTOFOREIGN NATIONALS 



105 




TOPS* 



MBRA 



DOCID: 3188691 

JOPS§CR£HHWB!ft 



(b) (1) 
(b) (3) 
OGA 



(b) (1) 

(b) (3J-50 USC 403 
(b) (3)-18 USC 798 
(b) (3)-P.L. 86-36 



Years later the "accidental" discovery 
of] came under serious question. In 



1961 George Blake, a British MI-6 official 
w ho had b een involved with the planning 
bf | | was identified as a Soviet mole 
by a Polish defector and was subsequently 
arrested and jailed. In 1970 Blake, who 
had escaped from a British jail and fled to 
Moscow, bragged to the press that he had 
betrayed the Berlin Tunnel operation. It 
was also susp ected tha t he had blown the 
whistle on the ) "O peration, too. 

Bitterness between NSA and CIA 
lasted for years. Canine was 
understandably upset when he found that 
he had been bypassed and left in the 
dark. PCI Allen Dulles once mused that. 




George Blake 

NSA and CIA continued to clash over a variety of issues as long as Dulles and Canine 
were the respective helmsmen. Yet the warfare was oddly out of place in Dulles's office. 
According to historian Thomas Powers, Dulles "never attempted to exercise [authority 
over the Defense Department intelligence components], partly in the interest of 
maintaining bureaucratic peace with the military, and partly because he just did not 

»93 



care. 




DOCID: 3188691 




Allen Dulles 




Dulles was interested in HUMINT and 
covert operations, not technical intelligence. 
Richard Bissell, who headed the CIA's 
operations organization in the late 1950s, 
once said that "Dulles was always being 
encouraged by successive Presidents to 
exercise more direction of the whole 
intelligence community. And Allen always 
resisted that. . . . He always wanted to run 
his Agency and exercise a direct, 
unambiguous control " M 



According to senior NSA officials of the time, the era of CIA's SIGINT system Was 
already beginning to fade. They had neither the time nor the money to pursue a big SIGINT 
system and a big HUMlNT/covert actions system simultaneously, and so SIGINT /Was 
sacrificed. / 

General John Samford, who replaced Canine in 1956, moved to heal the breach; with 
Dulles and the CIA. Samford was a consummate diplomat, and he probably gained; more 
by soft-soaping the downtown intelligence people than Canine could have done through 
head-on collisions. 95 ■ / 

(b)(1) 

(b) (3J-P.L. 86-36. 

NSA's Other Competitors 

The growing size and importance of COMINT made it inevitable that the cryptologic 
organizations of the armed services would have other competitors from time to time. 
During World War II there had been several. 

The Federal Communications Commission had a long history of communications 
monitoring to secure compliance with federal radio regulations'. During the early part of 
World War II, the FCC published a series of magazine articles plugging their successful 
efforts at finding Axis agent communications. The Army and Navy cryptologists did not 
appreciate this glare of publicity on their secret profession, and they sought to get 
Roosevelt to close down FCC operations. Roosevelt's order of 1942 (cited at the beginning 
of this chapter) was meant to apply to the FCC and other competitors of the Army and 




DOCID: 3188691 




Navy, but there is evidence that the FCC continued a small intercept effort into the 
postwar period. At some undefined point in the 1950s, the effort was probably shut down. 

The FBI represented a far stronger and potentially more dangerous foe. But J. Edgar 
Hoover's interests were more limited, and throughout his life the FBI displayed a certain 
ambivalence toward involvement in COMINT. During World War II the FBI was one of the 
three organizations given a COMINT role. Namely, they were responsible for monitoring of 
the communications of Axis agents in Latin America. This apparently simple division of 
effort placed the FBI in almost constant conflict with OP-20-G, which had a very similar 
mission. By all accounts, the FBI had a small but competent intercept and cryptanalytic 
section of indeterminate size. But COMINT had nothing to do with Hoover's main thrust as 
FBI director, and after the war the FBI COMINT effort was reduced. When FBI joined 
STANCIB in 1947 (which then became USCIB), Rear Admiral Thomas Inglis, the 
chairman of USCIB, offered COMINT resources to monitor agent communications and do 
the cryptanalysis. Hoover accepted, mainly because this would allow him to divert FBI 
resources to other matters. In 1947 FBI withdrew from USCIB, allegedly because of 
declining budget to do COMINT tasks. 



Even more 

important was the AFSA-FBI liaison which led ultimately to the arrest of the atomic spies 
(see p. 160). 96 

•ELINT and NSA 

ELINT as an intelligence discipline probably began during the Battle of Britain. The 
intercept of noncommunications signals was first attempted by one R. V. Jones, who 
successfully collected mysterious German navigational signals used by the Luftwaffe to 
steer their bombers to targets over Britain. Jones employed electronic countermeasures to 
divert the bombers and cause many of the bombs to fall off target. It was one of Churchill's 
top secrets of the war. 97 

The British understood the close relationship between ELINT and COMINT, and they 
centralized both under GCHQ. But when they tried to deal with the United States, they 
found American ELINT to be frustratingly decentralized. It wasn't just that they had to 
deal directly with the SCAs rather than AFSA and NSA, they found that even within the 
individual services there was no focal point. 

The SCAs did much of the ELINT collection for their respective services. Each one had 
a network of ELINT collection sites, often collocated with COMINT sites. But the tactical 
commanders also had their own ELINT assets, often airborne (and shipborne, in the case of 
the Navy). Once collected, the intercepted tapes were forwarded to processing centers in 




(b) (1) 

(b) (3)-50 USC 403 
(b) (3)-18 USC 798 
(b) (2)-P.L. 86-36 



DOCID: 3188691 



(b) (1) 
(b) (3) 
OGA 



J2E5ECRETTJ10JBRA 

the theater and on to the United States. Some of the processing centers were joint-service 
operations, while some were single-service. 

By 1953 the Army and Navy had established a consolidated ELINT processing center 
called ANEEG (Army-Navy Electronic Evaluation Group) collocated with NSG at 
Nebraska Avenue. The Air Force did not participate, preferring to keep a separate 
processing facility at AFSS headquarters, under the auspices of the Air Force Technical 
Intelligence Center (ATIC) at Wright-Patterson Air Force Base near Dayton, Ohio. NSA 
was not involved in this tangled web. 

In 1953 the Robertson Committee (see p. 227) reported to Canine on the profoundly 
disorganized nature of American ELINT and concluded that as a source of warning 
information, this intelligence discipline was in danger of becoming irrelevant. The 
committee recommended that a focal point be found. 98 

CIA, too, was unhappy with the way ELINT was being managed and in the same year 
conducted an internal study that indicted the Defense Department for mismanagement of 
ELINT. CIA pointed out that there was no central authority, no coordination of ELINT 
activities, and no central processing. The study opted to place central control in USCIB, 
but one option which the drafters seriously considered was to give NSA the job. 

There being no focus in U.S. intelligence for EUNT, CIA began to take on this task also. 
In 1954, the deputy director, General CP. Cabell (USAF), appointed an ELINT czar by 
giving H. Marshall Ch adwell, the assistant director for scientific intelligence, an 
additional hat for ELINT. \ 



When he received the Robertson study in November of 1953, General Erskine in the 
office of the secretary of defense called in Canine and requested an NSA response. On 
returning to Arlington Hall, Canine found his agency badly divided over what to do. The 
eminent logic of combining ELINT and COMINT was sometimes obscured by the evident 
difficulty of getting the services to heel to central authority and the dismal prospect of ever 
getting a charter as clear and unequivocal as NSCID 9. If COMINT, with NSCID 9 
conveying absolute authority, was proving so difficult to manage, what of ELINT? 

Despite this, the allure of finally getting the two pieces of the electronics puzzle 
together proved too strong. Under Canine's direction, NSA's Office of Plans and Policy 




HANDLE VIA TALENT KEYHOLE COMINJTCp^Ktet^YSTEMS JOINTLY 

not releasabi^toTSheign NATIONALS 



109 



TOPSE 



DOCID: 3188691 



lb) (1) 
(b) (3) 
03A 



TOPSEttET-ttWlBRA 

produced a draft report which placed operational and technical control of ELINT with 
DIRNSA. The battle was joined. 

When the issue went to USCIB, the JCS predictably defended decentralization. Over 
the ensuing two years, piles of studies were completed, and hundreds of options were 
tossed about. The services never relented in their opposition to any sort of restriction on 
the latitude of the tactical commanders to collect, process, and report ELINT. All concerned 
recognized that there should be some sort of overall coordinating mechanism and that the 
government must set up a central processing facility at which all the players would be 
represented, including non-DoD organizations (i.e., CIA). NSA appeared to be the only 
organization that felt that NSA should be in charge. 

The "ELINT Problem" was temporarily resolved in May of 1955 with the publication of 
NSCID 17. This document gave ELINT policy to USCIB and directed that a centralized 
ELINT processing center be set up (the National Technical Processing Center, or NTPC). 
..However, it still allowed for separate management of DoD and CIA ELINT activities. The 
Air For ce was given executive r esponsibilities for both ELINT and monitoring of jamming 
signals, Neither NSCID 17 nor the DoD implementing directive 

resolved the issue ol where JN'J'PC was to be located. After months of discussion, the 
services decided to keep it at Nebraska Avenue, where ANEEG was already located. 

NTPC was comprised initially of approximately one hundred people from the three 
services and CIA - NSA was not even represented. Most of the billets came from ANEEG, 
and the SCAs exercised a predominant influence since they provided most of the expertise. 
CIA, however, serit .a very strong delegation. An ELINT requirements group was 
established in 1956, com prising representative s from the services plus CIA, and later in 
the year a committee on was created. This was the first NTPC 



organization that had any sort of NSA representation. 

In 1956 NTPC was given the additional missioh,of processing telemetry from Soviet 
missiles. This problem was to grow and multiply almost geometrically as the Soviet 
missile problem became a national preoccupation. Sitting between COMINT and ELINT, 
telemetry would soon become another area of controversy . between NSA and its 
competitors. 

NSCID 17 was remarkable for what it did not do. It did not establish operational 
control in one organization. Nor did it rein in the propensities of tbe armed services to 
fund separate ELINT assets for nearly every operational command. It did not unify the 
technical aspects of the business. Instead, it consigned management to a committee which 
was already deeply fractured on other issues (such as the dispute between NSA and CIA 
over control of COMINT). It did not resolve anything at all, but it merely perpetuated an 
existing condition. 100 



(b) (1) 

(b) (3J-50 USC 403 
(b! (3) -18 USC 798 
(b) (3)-P.L. 86-36 



HANDLE VIA TALENT KEYHOLE CO MINT COTT TnOTu fiTTTKTTn iTOTUTT T 
NOT REUlASABi^TTTf^REiG^NATIONALS 



110 



DOCID: 3188691 



i(b) (1) 

: ?(b) (3)-50 USC 403 
1(b) (3)-P.L. 86-36 



IO&seafEfuj5*^RA 



BUILDING THE OVERT COLLECTION SYSTEM 

Few cryptologic fiel d sites survived World War II (see map on p. 113). By 194 7, the two 
services were operating! / j \ V\ \ The Army 



maintained large fixed field .sites, but very few of \ them. The Navy tended toward small 
sites, many with only a DF/ missibn, scattered throughout the world to maintain a DF 
baseline. 

Even more striking Was the geographic pattern. The United States had but one 
cryptologic organization oh the continent of Europe. 



sites were in the U.S. Of^he rest, the Army collection site v 
early days of World War/II. The other overseas sites were if 



copied primarilyl [targets. The Navy's overseas sites were, all in the 



pad existed s ince the 
md.they 



This soon changed. The Cold War, the Communist takeover in Czechoslovakia in 
1948, the Communist victory in China in 1949, and the unpleasantness in Korea, 
combined to force a revolution in America's cryptologic posture. The somnolent late 1940s 
became the go-go 1950s. Cryptologic planning was stirred to a white, heat, and the 
collection system fairly exploded. By 1960 American's cryptologic collection system 

| had basically been built. 



Three things typified this system: 

1. The target was the Soviet U nion. China, Korea, and the East European satellites 
were simply corollary targets. 



2. Containment of Communist expansion was the objective. The collection systein 
became geographically arrayed to resemble Lenin's pre dicted "capitalistic. 
encirclement," a figurative string of pearls beginning in/ 



■ j And despite this seemingly 

heedless expansion, NSA was barely able to keep up with customer requirements. 

3. This was the Golden Age of HF. Long-haul HF systems dominated the world 
communications networks. Above-HF transmissions did exist, but in HF's Golden 
Age, most of the truly important messages seemed eventually to find some mode of 
HF expression. Propagation vagaries demanded that collection sites be placed in a 
wide variety of locations. But in theory, if one established enough sites and built 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL gYSTEMS JOINTLY 
NOT BELEAGADLE TO FOREIGN NA T IONALS 



111 




DOCID: 3188691 



••'(b) (1) 
(b) (3) -50 USC 403 
(b)(3)-F.L. B6-36 



(b)(1) 

(b)(3)-50 USC 403 
(b)(3)-18 USC 798 
(b)(3)-P.L. 86-36 



Expansion proceeded on two fronts. The first Was ELINT, which Was chaos reborn. The 
services embarked on a period of virtually uncontro lled site-building. .. eunt was above 
HF. so si tes tended to be located in great prejfusion j 

In this field each SCA had been given t^e primary collection job by its. respective 



service, and each moved quickly to establish sites. In many, if not most, instances ELINT 
preceded COMINT, and again in most cases elint sites already existed where COMINT sites 
were later added. | \\ 

I J Added to this was a burgeoning airborne 

collection system, fielded by USAFSS. NSA played inb role in ELINT, either in collection or 
processing. \\ 

When it came to COMINT, though, NSA employed its guiding hand. Even before NSA 
was created, AFSA had a master plan for the establishm ent of SCA intercept sites which 

TJhis plan was passed on to NSA, 



which refined it. NSA worked very closely with each\ SCA to determine collection 
requirements and determine the best candidate locations. In the early 1950s NSA 
asserted control over site surveys, without which no collect ion site cou ld be established. 
NSA balanced customer requirements against existing overt sites, documented 

hearability, and Second and Third Party contributions. If the project did not make sense, 
DIRNSA could be counted on to oppose it. 101 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 0Y0TEM0 JOINTLY 
NOT RRT , fl ARABL E TO FOREIGN NATIONALD — 




112 



I DOCID: 3188691 



Xb) (1) 

fb) (31-50 USC 403 
(ti) (31-P.L. 06-36 




t.b) 11) 

_.-^--_„_ *i ^ ^ (h) (3) -50 USC 403 

DOCID : 3188691 <bI 31 ? 1 86 30 



DOCID: 3188691 

(b) (31-50 USC 403 
iW (3I-P.1. B6-36 



DOCID: 



3188691 



(b) (1) 

lb) (31-50 USC 403 
(b'l (3)-P.L. B6-36 




DOCID: 



3188691 



(b> (1) 

(b) (3)-50 USC 403 
(b) (3)-P.L. 66-36 




Mb) (1) 

!l\b) (3)-50 USC 403 
/Hb) (3)-lB USC 798 
/ I &) (3)-P.L. 86-36 



DOCID: 3188691 

lQp«af£ru^RA 

Berlin was in an entirely different situation. Its status as a four-po^er decupied city 
meant that Soviets could walk relatively freely even in the American 7 Secior. I Stalin's 
attempt to squeeze the Westerners out of Berlin (resulting in the Berlin Aiirlift) W 1948 
placed the city in a uniquely precarious position. In s uch circumstances tW first ipOMINT 
intercept organization, a detachment of the ASA site / ~[ arrived in a 

covert status and stayed only a few weeks in 1951. But ASA covert detachments kept 
appearing in Berlin, and in the following year the command established a permanent unit 
there, and the troops moved from tents to covered buildings. I 

In 1953 the Army G-2 concluded that the results had been paltry and recommended 
the site be closed, a strange finding given the later reputation of Berlin as a SI&NT 
bonanza. Fortunately, no one listened to the G-2, and ASA conti nued to occupy a variety of 



locations 



AFSS followed ASA into 



Berlin in 1954, beginning a presence in the city that would last until after the fall of the 
Berlin Wall. 102 \ 

Berlin became a SIGINT gold mine, a window into the heart of the Communist Bloc 
military system. In the mid-1950s the collection sites began to report the existence of VRF 
communications, and NSA moved in to investigate. An NSA technician 



discovered that Berlin was crisscrossed with above-HF communications that the West had i 
never before intercepted, including Soviet high-capacity multichannel and microwave ; j 
transmissions. The discovery was to have a profound influence on the development of thes I 
SIGINT collection system. 103 f 




(b) (3)-P.L. 86-36 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 3YSTEM3 JOINTLY 
HOT ItELGAOADLE TO FOREIGN NATIONALS — 



TO£SKffET UMBRA 



118 



DOCID: 3188691 



W (1) 

(b) (3] -50 USC 403 
(b),(3)-18 USC 798 
(b)'(,3)-P.i. 86-36 



"(b) (1) 



DOCID: 3188691 ? b|,3, - 50DSC403 



(b) (3) -18 USC 798 
C;b) (3J-P.L. 86-36 



DOCID: 3188691 



W (1) 

(Ex) (3)-50 USC 403 
(b)'M3)-18 USC 798 
(b) C31-P.L. 86-36 



;(b> (i) 

\b) (3)-50 USC 403 

DOCID: 3188691 \l\:l\ v V-ll 



(b) (1) 
(b) (3) 
OGA 




CZZJ 



DOCID: 3188691 



™ V' (b) (3)-50 USC 403 



(1$) (3)-P.L. 86-36 



tb) (11 

(b) (.31-50 USC 403 

(bl (3'1-P.L. 8S-36 - I'b) (D 



DOCID: 3188691 WBI t;' W5 



DOCID: 3188691 



'(■b) (1) 

(b!. (3) -50 USC 403 
(b)'{.3)-18 USC 798 
(b) (3').-P.L, 86-36 



;;ij!£(b) (1) 
(b) (3) 
"" II jOGfl 




DOCID: 3188691 



m in 

\h) (3) -50 USC 403 
tb) (3) -18 USC 798 
6b) (31-P.L. B6-36 




'(i>) (1) 

(£>.) (3) -50 USC 403 ' , 

DOCID: 3188691 (b ^>-« 7 9B ..,/(£ 

<b) (-3)-p.i,. 86-36 iyil 



DOCID: 3188691 l^U use « 3 

(b) (3)-lS USC 798 

' (A) (3)-P.L. 86-36 



DOCID: 3188691 i^U™ 

[bf,(3)-P.L. 86-36 



DOCID: 3188691 SI.U™ 

(bS-.(3)-e.L. B6-36 



DOCID: 3188691 



/(b) (1) 

f (b) (3)-50 USC 403 
(b) (3)~1B USC 798 




!33 



ASA PAC in the 1940s 
ASA's first postwar Far East headquarters was in a relatively intact building 
in downtown Tokyo. Japanese nationals staffed the support services. 



The Far North/ // 

All three services established collection sites in Alaska. The Kavy site at Adak dated 
back to World /War jj, and the Air Force and Army soon followed. The USAFSS site grew 
out of the a/World War II Army Air Corps asset. Security Se rvice established its 

first collection site | . "| The Army site was 

established hear Fairbanks (1950). But AFSS soon eclipsed ASA in resources, as the 
Jproved to be very lucrative and the predominant one in Alaska. 



Jeventually grew to become one of the major Security Service sites, while the 



ASA site closed in 1959. 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SYSTEMS JOINTLY 
kwt PCTi»g»iiirTn rnnrtmT ->t t -rrnuni .« 



131 



TOPSscfrrrTuiy^r^ 



DOCID: 3188691 

jomecRetu^r/ 



(b) ID 

(b) (3)-50 USC 403 
(b) (3J-18 USC 798 
(b) (3)-P.L. 86-36 



What It Was Like 

Military units tend to form around existing support organizations. Army units cluster 
at Army posts, Air Force organizations locate at existing Air Force bases, Navy units form 
at Navy bases. Cryptologic units, however, must go where they can hear targets. Where 
there is an existing military base, so much the better. But if there is none, one must be 
built specifically for the collection organization. This condition was especially true in the 
1950s, when collection was done primarily to satisfy national, strategic requirements 

HANDLE VIA TALENT KEYHOLE COMINT CONTROL 3TTOTEM3 JOINTLY 
NOT IlELBADADLE TO FOREIGN NATIONALS 




132 



DOCID: 3188691 



IOP-&KKrfFuiy^RA 



rather than to support tactical commanders. In such a situation, it was not necessary for 
cryptologic organizations to stay with a supported commander. They could, and often did, 
go off on their own. 

Geographically, collection sites were scattered. They tended to be small, isolated, and 
largely self-sufficient. Running a site required a very high level of independence and self- 
reliance. Even when collocated on a major military installation, the SIGINT unit was not 
part of the command structure. The post or base commander was generally not SI cleared 
and treated the cryptologic unit somewhat like a leper. Under such conditions, support 
was difficult to obtain. 

In the late 1950s, Air Force Security Service under Major General Gordon Blake 
decided to solve its logistics problems itself. With the blessings of the Air Force, AFSS 
began managing bases at which its unit represented the major activi ty. Begun in July of 
1958, the program eventually resulted in USAFSS's taking over/ 



jas^ 



well as their training base, Goodfellow AFB, Texas. The huge 466L building program (see 
chapter 8) may have been a factor, but Blake himself claimed that troop support was the 
driving force behind this program. It changed USAFSS into a large-scale landowner, and 
it was not copied by either ASA or NSG. 119 



Climate could b e an enemy. Air Force and Army sites at places 



would frequently be snowed in much of the winter. Roads] 

Jwere often impassable: Some sites could be supplied 



] 



only by helicopter. In the tropics, the lack of air conditioning at places like Clark made 
work almost unbearable. 



Even when the weather cooperated, condit ions in,.place.s 
[were primitive. Army troops arriving 



lived in pup tents for 



months. There was initially no air strip, and! visitors to the site had a two-day drive from 
over almost nonexistent roads. ::' 



IZZH 



Living conditions presen ted further challenges. A former resident of 



a relatively "plush" location 
terms: 



describes the site in fairly realistic 



The station itself was a loose cluster- of small, dusty buildings perche d on the cliff above the 
■ village 



■ our work went on in the shadow of a. ruined;[ 



Jibe age old strategic value of the place was shown by the fact that 

Icastle. 



(b) (1) 

(b) (3)-50 USC 403 
(b) (3)-18 USC 798 
(b) (3J-P.L. 86-36 



HANDLE VIA TALENT KEYHOLE OOMIWT CONTROL SYOTEMO JOINTLY 
Mf)T rrt g a c a pi p Tn TrnpgrrTiT tit » Tirnw I t h . 




DOCID: 



3188691 

T0B4«KEfu ( MfiRA 



'(b) (1) 
(b) (3)-50 USC 403 
(b) (3)-18 USC 798 
(b) (31-P.L. 86-36 



Water had to be hauled a mile from a spring. The site produced its own electricity With iliesel 
generators, as the local power could not be ..relied on. There were no barracks, &nd\the site 
personnel lived in apartments ! fr nd commuted by bus and boat | \\ [ bo 

the site. Since the ferry did not run after dark, the eve and mid shifts had to report at 1W0, and 
the off-duty watch slept in bunks in a quonsethut. 120 \ \ 



In the early days, intercept sites took on all manner of configuration, from squad tents 
to quonsets to clapboard "hootches" in Southeast Asia. (The term "hootch" derived from 
the Japanese word "uchi," meaning "home," and migrated from the postwar occupation 
forces to the jungles of Southeast Asia.) But they gradually assumed a classic\ap£eai-ance 
as systems were standardized and permanent structures built. Most permanent sites Were 
windowless blockhouses surrounded by high chain link fences with a single,, gtiarided 
aperture. \ 



and the base commander sometiDfies 
economized on space by building the golf course in the antenna field. \ 




The intercept area was generally divided into smaller rooms. Manual Morsfe, 
radioprinter, and voice modes usually had separate rooms, and at larger sites the Morse 
mission was frequently subdivided into rooms by target. Operators in the early days ofteft 



HANDLE VIA TALENT KBYIIOLB OOMINT OONTROL QYQTEMO JOINTLY 
NOT BELEASABLE TO FOREIGN NATIONAL" — 





The "spaghetti panel" RF distribution room at USM-1 (Vint Hill Farms) 



HANDLE VIA TALENT KEYHOLE OOMINT OOl i lTROL QY3TEM3 JOINTLY 
NT>T RF.T.E AS ^flfly F Tf ^ cvinTTPM tit TlTHM i T H 



135 




DOCID: 3188691 



ib) 11) 

(bl (31-50.USC 403 
(b)'I,3)-F.L. 85-313 



DOCID: 3188691 




The Navy site on Adak Island in the Aleutians survived and prospered despite the cold and snow. 

(b) (1) 

|b) [3)-50 USC 403 
(b) (3)-18 USC 798 
fb) (3)-P.L. 86-36 

HANDLE VIA TALENT KEYHOLE COMINT 00NTR0L3Y3TEMS JOINTLY 
NOT rtELEABADLE TO FOREIGN NA T IONALS ' 



137 




TO (1) 

{.b) (3) -50 USC 403 
(b) (3) -18 USC 798 




Barracks, USA-57, Clark AB, Philippines, early 1950s 
These early "hootches" lacked air conditioning 
(and just about everything else that would make them habitable). 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL CYSTEMB JOINTLY 
NOT RELEAOADLE TO FOREIGN NATIONALS 




138 



DOCID: 3188691 




All services showed an interest in DF as a SIGINT technique, but the Navy was far 
ahead of the other two. The Navy had begun experimenting with DF as a navigational aid 
as early as 1906, and until the mid-1930s DF was developed for its short-range 
navigational value. But by 1935 OP-20-G had got hold of DF for intelligence purposes, and 
it gradually turned the Navy's primary interest toward strategic and tactical intelligence 
applications. By 1941 the Navy operated twenty-two strategic DF stations, organized into 
Atlantic, West Coast, Mid-Pacific, and Asiatic nets. In addition, the Navy had found that 
the British had invented effective shipboard DF systems (something the U.S. Navy had yet 
to accomplish) and began buying these systems from the British. 



.(b) (1) 

(b) (3)-50 USC 403 
(b) (3) -IB USC 798 
(b) {3J-P.L. B6-36 



SIGINT Goes Airborne • 

Even by the end of World War II, the HF spectrum was becoming very crowded, and 
the Germans were beginning to experiment with VHF communications. Both the British 
and Americans flew airborne intercept missions against VHF targets during the latter 
stages of the war. 

Eighth Air Force, concerned about the possibility of a German march into the VHF 
spectrum, began to ins tall recorders and receivers set to pretuned frequencies on som e of 
their strategic aircraft ~ iThis 



they referred to as their "airborne Y Service." General "Hap" Arnold of the Army Air 
Force directed a crash program to develop a dedicated airborne reconnaissance program, 
replete with special schools, dedicated aircraft (a modified B-24) and designated 
equipment. The AAF called the program "Ferret," and in early 1943 sent the first B-24s to 
Adak in the Aleutians. In March of 1943 a Ferret aircraft flying out of Adak obtained 
what was probably the first airborne intercept of a Japanese radar emission. 124 

Spurred by the fortuitous capture of a Japanese radar on Guadalcanal in 1942, the 
Navy put together a seat-of-the-pants ELINT collection effort in the Pacific. The program 
did not have dedicated aircraft or specific units; the people involved just loaded their 
intercept gear on any airframe that happened to be flying in the right area. The effort paid 
off in June 1943, when Navy airborne intercept operators collected their first Japanese 
radar emission. Despite this success, however, the Navy realized that this approach was 
too haphazard, and in late 1943 a special reconnaissance unit was formed for the 
Southwest Pacific Theater. This very early effort eventually became the VQ-1 
squadron. 125 



HANDLE VIA TALENT KEYHOLE 0OMINT CONTROL 3YGTEMB JOINTLY 
NOT BELE ASABbE TO FOREIGN NATIONAL3 



139 Tg&SE€KSfuiyi^RA 



DOCID: 3188691 



"ft!) (1) 

(b)'13)-50 USC 403 
(b) (3> r P.L. 86-36 



JDR«CRfflJ^BRA 



Following-tne war, the Air Force continued aerial reconnaissance against the 



By 1947 the Army Air Force already had a rather elaborate postwar Ferret 
program in both the Far East and Europe. The AAF requested ASA assistance in placing 
COMINT intercept aboard, but at the time ASA displayed little interest. 126 



ft) (1) 

{bf(3)-50 USC 403 
(b) (3>vlB USC 798 
(b) (3) -EM. 85-36 



BLUE SKY 

Postwar comint airborne collection, however, developed from the Korean War rather 
than from the Soviet threat. In 1952 Air Force Security Service became concerned about 
reports that North Korean pilots were using the VHF spectrum for GCI communications. 
As their intercept of HF GCI communications was beginning to dry up, this seemed 
plausible and led to the establishment of a survey site on Cho Do Island. Cho Do definitely 
proved the existence of VHF GCI communications, and this finding boosted an embryonic 
USAFSS program to build a COMINT collection aircraft using an RB-29 as the platform. 127 

But the, p eople in the Far East were not wil ling to wait for a long-range fix. The 
commander of f | working with Far East Air Force, 

initiated an in-theater effort which they called Project BLUE SKY. The idea was to seize 
whatever platform was available - this proved to be a C-47. It was modified by the 
addition of collection equipment and antennas formed up into a single intercept position 
and was launched into a series of trial orbits. Although there was plenty of VHF to be had, 
the orbit, because of requirements to be able to communicate with the ground station, was 
far from ideal, and the initial trials were only moderately successful. The Air Force 
adjusted the orbit, but results were still mixed because the wire recorder produced 
scratchy, almost unintelligible voices. 

After the armistice in 1953, coverage requirements became even more pressing, and 
an additional VHF position was added. Results were better, but aircraft maintenance 
problems, equipment failures and lack of qualified transcribers on the ground prevented 
the program from fully realizing its potential. By 1958, however, BLUE SKY had expanded 
by the addition of three more C-47s, and the program continued until 1962, when all C-47s 
. were replaced by USAFSS RC-130s. 128 

Peripheral Reconnaissance 

The reconnaissance program of which BLUE SKY was a part came to consist of a 
bewildering variety of programs operated by American military services. 



Most of the missions were peripheral to the Soviet Bloc nations, and to those missions some 
rather strict rules applied. But some parts of the program apparently dealt with deliberate 
overflights. In the very early days, the penetration missions in Eastern Europe were for 
the purpose of unloading tons of propaganda leaflets. As time went on, however, CIA radio 
broadcasts substituted for more intrusive measures, and the overflights, turned toward 



HANDLE VIA TALENT ICE YI IOLB COMINT CONTROL SYS T EMS JOIN I L i 
NOT ItELEAGADLB TO FOREIGN NATIONALS 



Tgaseatfuj^BRA 



140 



(b) (1) 

(b) (3)-50 USC 403 
(b-) (3)-P.L. 86-36 



DOCID: 



3188691 



intelligence collection. The best known of the latter were the U-2 overflights which 
originated in the mid-1950s. Even when actual penetrations went out of favor, SAC 
continued to fly "exciter flights" along the periphery, nudging the boundaries of the Soviet 
air defense system to actually stimulate reactions and get them to turn on their 
equipment. 129 

By the early 1950s the Soviet Union had built a capable air defense system. It was 
deficient in high-altitude aerial intercept capability, but the Soviets had an outstanding 
radar detect ion system, beg inning originally with American lend-lease equipment. And 



as American 



tireraft -began playing vrith their Mfd^ (b)(3) so usc403 



coming up after them. 

The ensuing twenty years were marked by repeated border incidents, both aerial and 
naval. A study by NSA in 1986 documented 126 incidents, 81 of them occurring during the 
1950s. The peak year, 1952, was marked by nineteen incidents, including the downing of 
an RB-29 in the Sea of Japan on 13 June, the first SIGINT aircraft shot down during the 
Cold War (and the first loss of life by USAFSS intercept operators). 

The Soviets and their allies became hypersensitive to peripheral reconnaissance, and 
on occasion they acted "trigger-happy." In some cases, such as the shootdown of a USAF 
photo mapping mission north of Japan in 1954, Soviet radars showed the American 
aircraft in Soviet territory. In other cases, especially in the Berlin air corridors, Soviet 
pilots showed a predisposition to fire at an Allied aircraft no matter which side of the 
border it was on. Some missions were shot down; others were simply fired on or harassed 
by "buzzing." 

Although there is no direct evidence for it, it appears very likely that the pattern of 
peripheral reconnaissance employed by the U.S. and its all ies exacerba ted an already 
touchy situation and led to more i ncidents. As Table 5 shows| [ of the incidents 

were c learly aerial reconnaissa nce J and of thel 

| R econnaissance incidents^ iTteconnaisi 



_ econnaissance 

CPAs (closest point of approach) were frequently within a few..miles of the twelve-mile 
limit and often paralleled the border ait that distance for many miles. To the Soviets, this 
must have appeared as a taunt. The SAC exciter flights were the most provocative by far. 
This was made worse by the inherent inaccuracy of radar, which sometimes placed the 
Allied reconnaissance aircraft closer to the Soviet border than the aircraft's navigator 
believed to be the case. Into this volatile mix came the Soviet bloc fighter pilot, who had no 
way of knowing exactly where he was relative to the international boundary. 



(b)(3)-P.L. 86-36 



(b)(1) 

(b)(3)-50 USC 403 
(b)(3)-P.L. 86-36 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 0Y0TEM0 JOINTLY 
NOT ItELEAOADLE TO FOREIGN NATIONAL0 



DOCID: 3188691 



itb) (l) 

= (b) (3)-50 USC 403 
i'|(b) (31-P.I,. 86-36 



'fbK(l) 

(B) (3>-50 USC 403 
(b)''(,3)-p":'L-,....86-36 



Table 6 

Summary of Incidents by Type, 1949-1985 
Type Number/ 



Non-SIGINT aerial reconnaissance 
Other military 
Commercial/private air 
Military ship 



22/ 
56/ 

is 



Commercial ship (Mayaguez) 



The number and pattern of peripheral reconnaissance flights dver the years, and the 
nationalist sensitivities of the Communist nations, produced a lively time. Some of; the 
shootdowns became international incidents which heightened the' Cold War tensions and 
seriously affected international diplomacy. 130 j 

All three services developed their own aerial reconnaissance programs, each using 
different types of aircraft. Of the three, USAFSS had the largest program. Security 
Service began laying plans as early as 1948, but it was not given the go-abead from USAF 
until August 1950. Originally USAFSS hoped to use the C/47 as an iirframe, andUt 
actually tested that aircraft and a C-54. USAFSS decided on £he RB-50, k modification iof 
the B-29, as its long-range airframe, but none was available', and in the' early 1950s the 
command used an RB-29 as an interim measure. The single R B-29 went operational in tlie 
Pacific in 1954, flying out of but this was' never more than 



an experiment. AFSS finally ended up with a group often RB-50s in 1956, and by the fall 
of 1957 all ten were distributed - five to Asia and five to Europe. The program was a joint 
effort between AFSS and the theater commanders, who operated thej front end of the; 
planes. In the early years of the program, only the back-end crew was CQMINT cleared. Allj 
positions were under local control, and tasking was done by USAFSS with little or no NSA! 
input. 131 | i 

The Navy program developed from the early VQ-1 and VQ-2 sqpadrons originally i 
established in World War II. VQ-1 was originally based at Sangley Point Naval Station in 
the Philippines, flying P4M Mercators, P2V Neptunes, and A3D Sky warriors. In 1955 the 



In Europe the SIGINT reconnai ssance mission, VQ-2, evolved out of a W orld War II naval 
unit at Port Lyautey, Morocco. ^ 



HANDLE VIA TALENT KEYHOLE OOMIHT CONTROL aTOTEMS JOINTLY 
NOT RE LEASABLE TO FOREIGN NATIONALS 




142 



DOCID: 3188691 



(t>j ID 

(b) (3)-50 USC 403 
(b) (3) -1= USC 798 
(b) (3)-P.L. 36-36 



i(b) (1) 

/(b) (3) -50 USC 403 
i (b) (3J-P.L. 86-36 



TJJ&SECR6T Up/fBRA 




| | RB-5f 

When converted for reconnaissance use, the World War n B-29 was renamed the RB-50. 



The SAC Ferret program continued i n jthe postwar years with only minimal 
involvement by the cryptologic comriiunity. f| 



By Mte summergof 1951, both AFSS and AFSA had become 



interested in the program, and by' September thjb plans were expanded to includef 



J 



The Origins of Advisory Warning 



The AFSS unit at 



by how renamed!" 



realized tha t they 



leld in their hands information that could save an aircraft from being shot down. 



JJIn early 1952 



Jworked out a plan to warn aircraft 



in i mminent danger, by passing ft coded warning to the Air Control and Warning (AC&W) 
sites They wrote down their plan into a document which they 



HANDLE VIA TALENT KEYHOLE 0OMINT CONTROL 3Y3TEM3 JOINTLY 




DOCID: 3188691 



/5(b) (1) 

'i'(b) (3)-50 USC 403 
1(b) (3)-P.L. 86-36 



called Project BITTERSWEET and sent it to USAFSS for approval. In May 1952 AFSS 



approved the plan for temporary implementation, 



details of the new warning procedure wer0 still being worked out when, 
on 13 June, an RB-29 SIGINT collection flight was shot down oyer the Sea of Japan. The two 
AFSS operators who were killed might have been saved ha<d; a system been in place; the 
event added a real sense of urgency to this, the earliest advisory warning plan in American 
SIGINT history. 

At this point bittersweet got bogged down in t he tangled thicket of COMINT, 
classifications. The problem revolved around the possiblem \ 

/ / I USmB approve the ITRAFSS advWy 

warning plan for the Far East, but LSIB was reluctant t<? go along except in a war zone 
(i.e., Korea). / i 

It appears that at least one version of the plan was gweh interim approval by USCIB, 
and a former USAFSS operator claims that it was actually implemented in the early 1950s 
for at least one mission. Various modifications were intr^dticed to make it more palatable, 
such as the use of bogus messages disguised as warning tdiessages by AC&W units. 

In 1956 President Eisenhower, concerned over thef mimber of incidents and loss of 
reconnaissance aircraft, directed that positive action be taken to remedy the situation. 
The only change that resulted was the implementation bf a Navy warning program in the 
Far East, which contained certain safeguards, chief aiaoig these being the initiation of 
"blind" (unacknowledged) broadcasts. Through the summer of 1958, there existed no 
universal advisory washing program. 133 



The RC-130 Shootefown 11 

The RB-50 prbgram lasted only a few years. Tne aircraft were old and difficult to 
maintain and had room for only five positions. The success of AFSS collection against the 
growing VHF problem led to a new program on thi hefels of RB-50s, in which the new 
McDon nell-D ouglas C-130 would be converted to a /collection platform. The C-130 had 
room foi | p ositions, could fly longer and higher, andjbeing new, had few maintenance 
pro blems. AFSS planned for a fleet of | | in e&ch theater, to begin in 1958. The 

first | [ went to Europe, and in September AFSS, in A ssociation with USAFE, began to 
fly trial reconnaissance missions inl [areas 134 



HANDLE VIA TALEtiT K.E11IOLE OOMINT CONTROL 0Y0TEM3 JOINTLY 
MOT BELEASADLE TO FOItEIQK 1 i ATIOHALQ 




DOCID: 3188691 




RC-130 



Then disaster struck. On 2 September 1958 an RC-130 on its initial flight out of 
Adana strayed over the border and was shot down. Two pairs of MIG-15s (or 17s; there was 
not enough evidence to determine which) attacked the reconnaissance aircraft in waves in 
a well-coordinated operation which left no room for doubt that their intent was 
destruction. The voice tapes were as dramatic as they were damning. (See p. 146.) 

The Soviets said nothing, so the State Department on 6 September sent a note to the 
Soviet government requesting information on an unarmed C-130 carrying a crew of 
seventeen which had disappeared during a flight from Adana to Trabzon, Turkey. Finally, 
on the 12th the Soviet embassy in Washington replied that the missing transport had 
crashed in Soviet Armenia, killing six crew members, but that Moscow had provided no 
information about an additional group of eleven. An exchange of diplomatic notes over the 
next ten days shed no further light on the missing eleven bodies, so on 21 September the 
State Department admitted that they knew the aircraft had been shot down and appealed 
for information on the rest of the crew on humanitarian grounds. The Soviets replied that 
they considered the flight to have been an intentional violation of their borders but made 
no reference to the involvement of fighter aircraft or a shootdown. 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SYSTEMS JOINTLY 
NOT BBLEASABLE TO FOREIGN NATIONALS 



145 




DOCID: 3188691 



T^E^ECREfur^RA 



PBS 

[pilot billet suffix] 
582 

201 to 218 

201 

201 



CONVERSATION 

The target is a large one Roger 

Attack! Attack! 218, attack. 

I am attacking the target 

Target speed is 3000, 1 am flying with it. 
It is turning toward the fence [i.e. , border]. 

201 The target is banking It is going 

toward the fence. Attack! 

21 & Yes, yes, I am attacking. 

[missing] The target is burning 

[missing] The tail assembly (b% is falling off) the 

target. 

[missing] Look at him, he will not get away, he is 

already falling. 

[missing] Yes, he is falling (b% I will finish him off) 

on the run. 

[missing] The target has lost control, it is going 

down. 

A crew of seventeen men, including eleven USAFSS airmen and a front-end crew of six, 
was lost. 

In October the Soviets produced the bodies of the six members of the front-end crew, 
but the bodies of the eleven USAFSS airmen were never turned over; and this strange 
circumstance produced a spate of conspiracy theories regarding the possible capture and 
long-term incarceration, not to mention forceable interrogation, of the COMINT crew. The 
evidence of the voice tapes makes it quite clear that no one could have escaped the fiery 
crash in a mountainous region of the Caucasus, but what happened to the bodies remains a 
mystery to this day. 135 

In November, after more than two months of Soviet "stonewalling," Deputy Under 
Secretary of State Robert Murphy summoned Soviet ambassador Mikhail Menshikov to 
his office, told him he had the voice tapes of the shootdown, and said he would play them 
immediately. Menshikov declared that he was not a technician and walked out of the 
office. In January of the following year, Vice President Nixon and Secretary of State 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL BYSTEM3 JOINTLY 
- NOTRffT FASABLE TO FOREIGN NATIOHALQ 




DOCID: 3188691 



Dulles protested the Soviet attitude on the shootdown to First Deputy Chairman of the 
Council of Ministers Anastas Mikoyan, but their representations were again brushed 
aside. Out of patience, the administration on 5 February released copies of the tape to the 
New York Times, which published them on page one. This deliberate leak of COMINT had 
already been placed before USCIB, which had concurred, as had the British. 139 

The downing of the RC-130 had immediate and serious consequences. USAFE 
grounded the entire RC-130 fleet, and Headquarters USAF requested a complete review of 
the ACRP program worldwide. USAFSS produced statistics designed to prove the 
effectiveness of the program when compared with ground collection sites, and by mid- 
October the flight ban had been lifted. As part of its review, USAFSS also investigated the 
possibility that the aircraft was meaconed (intentionally lured over the border) by Soviet 
navigational facilities. This possibility added to the conspiracy theories surrounding the 
fate of the RC-130, but it was largely contradicted by the internal evidence of the study 
which showed that three navigational beacons in the area, two of them in the Soviet 
Union, were all operating on virtually the same frequency. Thus, the aircraft very likely 
homed on the wrong beacon and pulled itself off course. 137 Although President Eisenhower 
himself believed it to have been a deliberate meaconing incident, it was more likely a 
navigational error on the part of the SAC crew. 



(to (lj 

(b) (3)-5'0 USC 403 
(b) (31-P.l. 86-36 



Advisory Warning Is Implemented 

The downing of the RC-130 decided the advisory warning issue. USAFSS gave its 
units immediate authorization to man the heretofore unmanned manual Morse position 
aboard the RC-130s for internal advisory warnin g. And the long-stalled plans for the 

]got untra cked. By 1961 US AFSS and 

applying to 



provision of warning „ „ 

SAC had implemented a limited advisory warning program!" 



their own reconnaissance aircraft. In 1963 this was merged into a national program 
encompassing all peripheral reconnaissance aircraft, a JCS plan named WHITE WOLF. 138 



The construction of the super-site s in the 1950s resulted in an intercept system that 
was increasingly effective in its ability 



2 shootdown; (See p. 148)- -But since 



By 1960, USAFSS demonstrated a high leve l of competence to 

Iduring the U- 



HANDLE VIA TALENT KEYHOLE COMINT OONTItOL 0YQTEM3 JOINTLY 
NOT RffiT ffASABLE TO FOnEIOK NATIONALS 



147 



TQE-SECffffllMfiRA 



DOCID: 3188691 




communications in the 1950s. 



(b) (1) 
(b) (3) 
OGA 



(b) (1) 

(b) (3)-50 USC 403 
(b) (3)-P.L. 86-36 



TheRB-47Shootdown 

As time went on, progressively fewer reconnaissance aircraft were shot down, but 
those that were took on a heightened diplomatic importance. Surely the most signficant 
was the 1 May 1960 shootdown of the U-2 piloted by CIA's Francis Gary Powers. (This 
shootdown will be treated in detail in a separate section.) Second only to that, however, 
was the shootdown o f an RB-47 ELINT mission over the Bare nts Sea on 1 July 1960. The 

and proceeded on its charted 



aircraft took off from ^ 

course in the Barents, until it was intercepted by a covey of Soviet fighters. As the aircraft 
paralleled the Murmansk coast, two Kilp'Yavr fighters intercepted it, and at least one 



seriously damaged aircraft 






After a twenty-minute struggle, the plane crashed in the icy 



the waters alive by a Soviet trawler, but the other four died. 

Coming as it did only two months after the U-2 incident, it presented Soviet premier 
Nikita,Khrushc.hev with another opportunity to heat up the Cold War. After waiting a 
few days to see what the Eisenhower administration would say, the Soviet leader went on 
the attack, revealing that th ey had shot down the plane and were holding the two 
survivors in Lubvanka Prison.! " ' 



In the Oval Office, Eisenhower worried about the diplomatic and political implications 
of peripheral reconnaissance and asked his military advisors if it was worth it. General 
Nathan Twining of the Air Force delivered a ringing defense of the program, and he 
convinced Eisenhower to keep the airplanes flying. But the president directed that the Air 
Force find faster reconnaissance aircraft so that the Soviets would have a more difficult 
time shooting them down. The quest for a better aircraft eventually led to the SR-71 
program. 1,10 




DOCID: 3188691 



TOP§ECRE?Ul^BRi 



BRA 



(b) (1) 

(b) (3)-50 USC 403 
(b) (3)-P.L. 86-3S 



During the Oval Office review of the perip heral reconnaissance program, the Air Force 
revealed the extent of the program in 1960. I " ] 



SAC had two strategic 



/reconnaissance wings flying worldwide missions,/ 

/ / In Europe the COMINT 

1/ aircraft (mostly RC-130s) were operated by USAFE, which seemed to be getting all the 
newest and best aircraft and collection gear, in line with Eisenhower's expressed desire to 



I (The pr omised nine RC -130s had evidently not yet 

arrived.) Th e Navy had a naval air squadron at\ ^e quipp ed with smaller naval 



patrol craft, 
operated an ai rborne collection unit trom| 
operating from 



and the Marines 
special naval unit 



.. As for the fate of the RB-47 flyers, Khrushchev kept them in Lubyanka until after the 
change of administration and then returned them as a cynical olive branch to the newly, 
elected President Kennedy a few days after his inauguration. Kennedy met the released 
flyers at Andrews Air Force Base and, to flaunt his Cold War sympathies, had them to the 
White rjouse for coffee. 142 If Khrushchev hoped to use the reconnaissance program to curry 
favor, he failed. Kennedy was even more fervently anti-Communist than Eisenhower.^=-"""' 



'(b) (1) 
(b) (3) 



...Notes'... 



(b) (1) 

(b) (3) -50 USC 403 
(b) (3J-18 USC 798 
(b) (3)-P.L. 86-3S 



history office. 



Tliie History of SIGINT in the Central Intelligence Agency, 1947-1970," October 1971, CIA 



JVol il, 2. 



3. CCH Series VI.D.1.1. 



4. The be st, and virtually the only, body of information on NSA's early organization is a manuscript bj 
available in the Center for Cryptologic History. 



5. George Howe working papers, History of the Directorate, in CCH Series VI.D.l .2. 

6. Brownell Committee report. "" 

7. "Report on Intelligence Activities in the Federal Government, Prepared for the Commission on Organization of 
the Executive Branch of the Government by the Task Fbree.on Intelligence Activities, [the Hoover Commission 
Report]," App. 1 , Part 1 : The National Security Agency, May 1 955; in CCH Series VI.C.l .8. j 

8. Classification Act of 1949, amended 24 Oct. 1951. See also file on manpowerand personnel strengths in CCH 
Series VI.E.1.4. ' | 



9. Robertson Report, in CCH series VLX.l .6. 



(b) (3)-P.L. 8S-36 




HANDLE VIA TALENT KEYHOLE COMINTCONjEB©irSTSTEMS JOINTLY 
NOT RELEASABJUftWFCREIG^NATIONALS 



149 




TOPSE 



DOCID: 3188691 



/(b) (3J-P.L. 86-36 



/(b) (1) 
(b) (3) 
OGA 



10. "NSA Review of the U S. Cryptologic Effort, 195 2-54," in CCH Se ries Vl.EE.1.3.; interview, Louis W. 
Tordella, 28 June 1990,by Robert Farley, NSA OH8-9ujj | "Glimpses of a Man: The Life of Ralph 

J. Canine," Cryptologic Quarterly, Vol. 6, No. 2, Summer 1987; Burns, The Origins of the National Security 
Agency, 61. 



11. Interview with Abraham Sinfcov by Arthur Zoebelein j~ ~| Dale Marston and Sam Snyder, May 
1979, NSA OH 2-79 1 hrough 4-79 1 



12. 



Teaming in AFSA/NSA, 1949-1960 " unpublished manuscript inCCH Series V.F.4.1. 

13. "NSA Review of U.S. Cryptologic Effort. ... 

14. Howe, "The Nan ative History of AFSA/NSA" Part V. 

15. NSA/CSSArchives,ACC:10460,CBRI51. 

16. Howe, "Narrative History," Part V. 

17. NSA oral history with Hugh Erskine, by Vince Wilson, 1972; oral history with Dr. Robert J. Hermann, 2 
September 1994, by Charles Baker and Tom Johnson, NSA OH 45-94. / 

18. George F. Howe, "A History of U.S. Civilians in Field COMTNT Operations* 1953-1960," Cryptologic 
Quarterly, Spring 1973, 5f9; and correspondence file in NSA/CSS Archives, ACC 26430, CBOM22. 

19. NSA/CSS Archives, ACC 1664N, Gl 4-0207-7. 

20. File of sample C#IIN^ Reports for 1948-1953, in CCH.Series VI.M.2.1. 

21. CCH Series VI.m2.i.| 

22. Production memo 37/53, in "COMINT Reporting Responsibilities, Reports and Translations," in CCH Series 
VI.M.1.2. /II/ 

23. NSA 901 Publieati{raj3 Precedures Memo #6/(3 October 1953, in CCH Series VI.M.1.7. 

24. See "Reporting Policy" memoes in CCH Series VI.M.1.7. 

25. Hoover Commission/report. 

26. The best, and practically the only,; 'comprehensive discussion of AFSA and NSA training in the 1950s is in 



[ Training in AFSA/NSA, 1949-1960," unpublished 1961 manuscript in CCH Series V.F.4.1. 
Unless indicated otherwise, the material in this section derives from the Bauer work: 

27. AFSA SchUl Catalogue 1952, in CCH Series V.F.4.2. 



28 " I / / f THistdrical Study: The Security Program of AFSA and NSA, 1949-1962," unpublished 

manuscript ih/CCH Series X.H. 7. See also Interview with Herbert L. Conley, 5 March 1984, by Robert Farley, 
NSA OH 1-$/ 



29. | h istorical Study: The Security Program "See also Interview, Cecil J. Phillips, 8 July, 1993, by 

Charles Baker andTom Johnson, NSA OH 23-93, and written comments by David Boak, October 1994. 

30. CCH Series VI.G.1.1. 

31. | Ip istory ofSIGINT in CIA, V. Ill, 158. 

32. | | »The Security Program..." 

33. Ibid. 




/Kb) (3J-P.L. BS-3S 



DOCID: 3188691 



(b) (1) 

(b) (3J-P.1. B6-36 
(b) (3)-50 USC 403 
(b) (3J-18 USC 798 



1 jDOP«CRfruiy^RA 

34. Hoover Commission Report.(VI.C.1.8.); ]NSA Review of U.S. Cryptologic Effort. . . (VI.EE.1.3.); Robert J. 
Watson, "Consumer Liaison yiuts,1949-1957" April 1957, ACC 10684, CBRI 52; and "AFSS-NSA Relations, 
October 1952-September 1954," V. I, USAFSS Official History available at Hq ALA, Kelly APB, San Antonio, Tx. 

35. | 



'Early BOURBQN - 1945: The First Year of Allied Collaborative COMINT Effort 



against the Soviet Union," Cryptologic Quarterly, Spring 1994, 1-40. 

36. CCH Series VI.EE. 
in Support of COMINT, 



,,[ 

'."cofll 



SIGINT Directives,: 28 Sep 1992 NSA(P0443) paper; "Mechanization 

ection of papers dated from 1954-1956, in CCH Series XII.Z. 



37. "Mechanization in support of COMINT." 

38. "Site Survey/Hearability Tests," in CCH SeriesVI.I.1.1. 

39. George Howe, "Narrative History," Part V. 

40. CCH Series V.A.28., and VI.M.1.5. 

41. Letter, Canine to SCA chiefs, 14 June 1955, in CAHA, ACC 26418, CBOM 16. 

42. CCH Series VI.M.1.5. 

43. USAFSS History, "Historical Resume: Development and Expansion of USAFSS Capability in the Pacific 
Area, 1949-1957," available at AIA hqs, Kelly AFB. 

44. Memo fin MGen Samford (USAF) to Commander, ADC, 2 Mar 1954, in CCH Series VI.M.1.5; Robertson 
Report in CCH Series VI.X.1.7. 



48. Holtwick memo 13 June 1955, in CCH Series VI.P.2.1. 

49. CCH Series VI.NN.1.1. and VI.NN.1.3; see also VI.P.2.2. 

50. CCH Series VI.P.1.3. 

51. Richard R. Ferry, "A Special Historical Study of the Organizational Development of United States Air Force 
Security Service from 1948-1963," 1963, available at Hqs AIA, Kelly AFB, Texas. 

52. Interview with John E. Morrison, 10 August 1993, by Charles Baker and Tom Johnson, NSA OH 24-93. 

53. "A Brief History of AFEWC," May 1977, and "History of ACOM Tasking in the AFSCC, 1 July 1961-31 
December 1964"; available at Hq AIA, Kelly AFB, Texas. 

54. Interview with Lt Gen Gordon A. Blake, 19 April 1984, by Robert Farley, NSA OH 7-84. 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SY3TEMS JOINTLY 
NOT RELEADADLE TO FOREIGN NATIONALS 1 



151 



JO&SECfTEfijIvlBRA 



DOCID: 3188691 



•■'(b) (3J-P.L. 86-36 



joasKRETtrraBRA" 



(b) (1) 
(b) (3) 
OGA 



58. Howe, "Narrative History."; CCH Series VI.H.H.12.11; "AFSS-NSA Relations, October 1952-September 
1954, V. I, available at Hq AIA, Kelly AFB, Texas. , \\ 

59. NSACSS Archives ACC 37911, H03-0305-2; interview with Milton Zaslow, 14 %y 1993, by Charles Baker 
and Tom Johnson, NSA OH 17- 93; interview with Louis TordeUa, 28 June 1990, by Charles Baker and Tom 
Johnson, NSA OH 8-90. \\ 

60. See Hay S. Cline, The CIA under Reagan, Busk and Casey (Washington, D.C.: Acropolis Books, 1981), 78; 
Robert L. Benson, "A History, 6f U.S. Communications Intelligen ce During World War II: Policy and 
Administration," CCH manuscript pending publication, Chapt II, 14. J S | , Donovan and the CIA 
(Washington, D.C.: CIA, .1981). i 

61. See Benson, " History"; interview with Oliver R. Kirby, 11 June 1993, by Charles riaker, Guy Vanderpool, 

ind David Hatch, NSA OH 20-93. \ 



62. 



"A History ofSIGIITO in the Central Intelligence Agency, 1947-1070," Vol IV, App. M.; 



CIA history staff. 
63. CIA's early role in COMINT is covered i J 



[throughout); in a second CIA history ';' b\ 



NSA OH 14-81. 



01ine,"TheC'lA...* " 

64. Interview with Frank Rowlett, various dates, by Henry F. Schorreck and 

65. Interview with Louis W. Tordella, 28 June 1990, by Charles Baker and Tom Johnson, NSA OH 8-90. 

66. Summary of CIA contributions to COMINT, 1975, in NSACSS Archives, ACC 27845Z, CBDC .53. 

67. Undated memo in NSA/CSS Archives, ACC 19168, H20-0111-5. 



ipril 1974; and in 



71 



.72, 



iToHI. 



/ol. II; NSACSS Archives, ACC 9136, Gll-0602-1; ACC 3042, G15-0508-4; ACC 9136, CBIB 26; Capt 



George P. McGinnis, "The History of Applesauce," Spectrum, Winter 1973, 9-13. 
73. See NARA, RG 457, SRH- 355. 
74 



76. ] "I nterview; Sinkov interview; Tordella .interview. ... 

77] 



(b) (1) 

(b) (3) -50 .USC 403 
(b) (3)-18 USC 798 
(b) (3)-P.L. 86-36 




DOCID: 3188691 



'(b) (3)-P.L. 86-36 



(b) (1) 
(b) (3) 
OGA 



(b) (1) 

(b) (3)-50 USC 403 
(b) (3)-18 USC 798 
(b) (3)-E.L. 86-36 



JWSECBHHJTJfgRA 




81. David Kahn, Hitter's Spies: German Military Intelligence in/World Warn (New York: MacMillan 1978) 
429-42. ' 

82. Mary Ellen Reese, General Reinhard Gehlen: The CIA Connection (Fairfax, Va.: George Mason University 
Press, 1990). 




91. Eisenhower Library papers in CCH, Series XVI; ACC 17720, CBTE 18; ACC 4821, CBSB 57; ACC 2144, 
CBSB 11; ACC 20645, CBJXJ 14; ACC 16392N, CBRG 23; ACC 19631, CBTL 11; ACC 1910B, CBTI 33; ACC 
5559N, eBpp.25; ACC 26424, CBOM 22. 

92 - l - Ppera&lA ~ The Berlin Tunnel, U.S. Cryptologic History, Special Series , Number 4 

(Ft, Meade: NSA, 198% Vol; Ilj 1 

"Newspaper Items Relating to NSA," in CCH Series VI.II.1.2.; Kirby interview; 

93. Thomas Powers, The Man Who Kept the Secrets, 83. 

94. Interview with Richard Bissell, Jr., by Dr. Thomas Soapes, 19 Nov 1976, CIA history staff. 

95. "CIA-NSA Relationships . . . ,* GCH Series VI U.I.2.; Tordella interview. 

96. Robertson Report, in CCH Series VI.G1:H; NSA/CSS Archives, ACC 29965, H01-0706-5 

97. See Jones, The Wizard War: British Scientific Intelligence, 1939-1945 (New York: Coward, McCann and 
Geoghegan, 1978). 

98. Draft Robertson Committee report in CCH Series VI.X.1.7. 



100. "Background to the Robertson Report: Potentialities of COMINT for Strategic Warning," in CCH Series 
VI.X.1.7; Draft of Robertson Committee Report in CCH Series VI.X.17.; "ELIOT History and Background 



HANDLE VIA TALENT KEYHOLE COMINTCONT£QI^S¥STEMS JOINTLY 
NOT RELEAS^BJ^eTORETG^NATIONALS 




153 



TOP SEC 



DOCID: 



3188691 



!b) (1) 
(b) (3) 
OGA 



Papers," in CCH Series Vl.O.1.1.; Hoover Commission Report in CCH Series VI.C.1.8.; "History of the Electronic 
Intelligence Coordinating Group, 1955-1958," in CCH Series VI.O.1.6. 

101. NSA/CSS Archives, ACC 9092, CBIB 24; "Acquisition of COMINT Intercept Stations Overseas," in CCH 
Series V.F.6.1. 



1 1 6. Howe, "Narrative History," Part V, Ch. XXVI-XXX; Ferry, "Special Historical Study. . . "; "Synthesis of ASA 
Programs, FY 53," in CCH Series VI.Q.1.14; NSACSS Archives, ACC 9092, CBIB 24; "History, Location aid 
Photos of ELINT sites," in CCH Series VI.O.1.4.; "INSCOM: and its Heritage - a History," in CCH Series 
VI.Q.1..15; MSgt William R. Graham, "Misawa - Air Base and City, " 1982. 



' (b) (1) 
(b) (3) -10 USC 130 
(b) (3) -50 USC 403 
(b) (3)-18 USC 798 



HANDLE VIA TALENT KEYHOLE COMTNTCJiDCER©frS7STEMS JOINTLY 
NOT RELEAaABfeBflTTPSREIGNNATIONALS 



154 



DOCID: 3188691 



s(b) (3)-P.L. 86-36 



(b) (1) 

(b) (3)-P.X. 86-36 
(b) (3)-50 USC 403 
(b) (3) -18 USC 798 



119. "A Chronology of Significant EventSiin the History of Electronic Security Command, 1948-1988," 1990, 
available at AIA Hq, Kolly AFB, Texas; Interview with Gordon W. Sommers by Millard R. Ellerson and James E.' 
Pierson, January 1990, available at AIA Hqs. 



120. 

Series Vl.y.1.16. 



article in I^CVA* Crjiptolog, Pall 1989; "INSCOM and its Heritage - a History," in CCH 





122. 


{ 
i 


123.| / 


"Radio Direction Finding in the U.S. Navy: The First Fifty Years," 



124. Don East (Capt, USN(R)^, "A history of U.S. Navy Fleet Air Reconnaissance, Part I: The Pacific and VQ-1," 
The Hook, Spring 1987, 16.;/ Oral interview with Samuel K. S. Hong, Dec. 9, 1986, by R. D. Farley, Honolulu, 



Hawaii, NSA OH 40-86 
125. East, 15-17 
126 



Joid BOURSON - 1947: The Third Year of Allied Collaborate COMINT Effort against 



the Soviet Union," Cryptologie Quarterly, Vol. 13 No. 3. Fall 1994 

127. William E. Burroughs, Deep Black: Space Espionage and National Security (New York: Random House, 
1986), 58-9.; "A History of the USAFSS Airborne SIGINT Reconnaissance Program (ASRP), 1950-1977," in CCH 
Series X J. j 

; 

128. "Analysis of AFSS Effort in the ijtorean Action," unpublished manuscript available in CCH Series V M.4.I.; 
"A History of the USAFSS Airborne SIGINT Reconnaissance Program (ASRP), 1950-1977," 20 Sep 1977, 
USAFSS history available in CCH Series X J. 

129. See Buroughs Deep Black, 58-59, and Thomas Powers, The Man Who Kept the Secrets, 24. 

130. The definitive study of reconnaissance incidents was done by NSA historian Donald Wigglesworth in an 
unpublished stud y entitled "A Summ ary of Peacetime Hostile Air and Sea Actions 1949-1985," March 1986, in 
CCH. In addition.1 Trecently published an article in the Cryptologie Quarterly ("Maybe You Had 
to be There: The SIGINT on Thirteen Soviet Shootdowns of U.S. Reconnaissance Aircraft," Vol. 12 No. 2, Summer 
1993, 1-44), which provides an excellent summary of the shootdown of reconnaissance aircraft. 

131. "A History of the USAFSS Airborne Sigint Reconnaissance Program ..." Mary Holub, Jo Ann Himes, 
Joyce Horns, and SSgt Kay B. Grice, "A Chronology of Significant Events in the History of Electronic Security 
Command, 1948-1988," in CCH Series X.J.6. 

132. East, "VQ-1. . . ," and East, "The History of U.S. Naval Airborne Electronic Reconnaisaance: Part Two, the 
European Theater and VQ-2," The Hook, Summer 1987, 32-35. 

133. "Analysis of AFSS Effort in the Korean Action," USAFSS history availahle in CCH Series V.M.4.I.; CBTJ 
44, NSA/CSS Archives, ACC 19220; USAFSS, "A Special History of the Advisory Warning Program, July 1961- 
December 1964," in CCH Series X.J.3.1. 

134. USAFSS, "A History of USAFSS Airborne SIGINT Reconnaissance. . . ." 



HANDLE VIA TALENT KEYHOLE COMIN T CON T R O L S¥bTH,Mb J UI1MTLV 
NOT BELEASADLE TO FOREIGN NATIONALS 



155 



T(JJ^S££RET UMBRA 



DOCID: 



3188691 




Chapter 4 
The Soviet Problem 

THE EARLY DAYS 

From Stettin in the Baltic to Trieste in the Adriatic, an iron curtain has descended across the 
Continent. Behind that line lie all the capitals of the ancient states of central and eastern Europe 
... all these famous cities lie in what' I might call the Soviet sphere, and all are subject, in one 
form or another, not only to Soviet influence but to a very high and in some cases increasing 
measure of control from Moscow. 

Winston Churchill, 6 March 1 946 

The end of World War II did not result in a large number of unemployed cryptologists. 
That it did not was due almost entirely to the advent of the Cold War and an increasing 
concern with what came to be called the Soviet Bloc. (In the 1950s, believing in a world- 
wide Communist conspiracy, Americans called it the Sino-Soviet Bloc.) 

Wartime cooperation with the Soviet Union began to break down in early 1945. 
Through a series of late- war conferences among the Allies, it became clear to the West that 
the Soviet Union did not intend to retreat from Eastern Europe at the end of the war. An 
increasingly frustrated Roosevelt administration became less and less constrained about 
public references to the rift with Stalin, but Roosevelt himself remained convinced up to 
his death in April 1945 that the rift could be healed by diplomacy. His successor, Harry 
Truman, did not share this optimism. 

The administration moved to check Soviet expansionism abroad. As a result of strong 
pressure, Stalin removed Soviet troops from Iran later in the year. Meanwhile, Greece was 
faced with a USSR-inspired internal Communist threat, while neighbor Turkey faced an 
external threat by Soviet divisions massed on its borders. Truman again faced down 
Stalin, announcing the Truman Doctrine, a promise to come to the aid of countries in that 
area faced with Communist subversion or external threats. Administration policy toward 
the USSR hardened with the publication, in the magazine Foreign Affairs, of an article by 
George Kennan, late deputy chief of mission in Moscow, postulating the Cold War doctrine 
which became known as "containment." 

The next year a democratically elected government in Czechoslovakia fell to a 
Communist coup, and the new government became an effective satellite of the USSR. 
Meanwhile, Soviet troops remained in Poland and East Germany, while Communist 
governments took over in Hungary and the Balkans. In June 1948 Stalin tried to cut 
Berlin off from the West, and Truman initiated the Berlin Airlift to resupply the city. The 

HANDLE VIA TALENT KEYHOLE COMINT CONTROL 3Y3TEM8 JOINTLY ' 
NOT ItELEASADLG TO FOREIGN NATIONALO 




DOCID: 3188691 




Truman administration also saw the Korean War as the first move in a Soviet-inspired 
military offensive. 

The Advent of BOURBON 

American cryptology had dabbled with the Soviet problem over the years, with 
indifferent success. Yardley, in his book The American Black Chamber, claimed to have 
broken Soviet diplomatic codes. The truth is that, though Yardley's MI-8 worked Soviet 
diplomatic traffic, only a single instance of success was ever recorded, and in that case the 
transposition being attacked was based on the German language. 1 

Friedman's Signal Intelligence Service obtained MI-8's traffic upon MI-8's demise in 
1929 and made a brief, unsuccessful attempt to solve the codes. Then in 1931 a Soviet 
espionage front posing as a trading company called AMTORG came under the glare of 
Representative Hamilton Fish of New York, who subpoened some 3,000 AMTORG cables 
from the cable companies in New York. Fish turned them over to OP-20-G, which, having 
at the time only two cryptanalysts (Safford and Wenger), failed to solve them. The cables 
were then transferred to SIS, which also blunted its spear. This was virtually the only 
attempt at Sovcdiplomatic traffic by the services during the 1930s, and Friedman's people 
doubted that any Soviet codes could be solved. 2 

They were, in fact, wrong. 

attack on Soviet military systems throughout the 1930s. The primary target was 

COMINTERN (Communist International) traffic, | "~| 

But when, in June of 1941, Hitler's army invaded Russia, the British allowed the Soviet \ 

problem to wither. GCCS made a brief attempt to turn the USSR into a COMINT Third \ 

Party, and even established an intercept site in Russia near Murmansk in 1941. The 1 

dialogue came to a quick halt when the Soviets began inquiring into British success (b) pi-so use 

against ENIGMA. In 1942, the Radio Security Service and the London Metropolitan Police 403 

discovered an extensive Soviet illicit network in Great Britain, and Stewart Menzies, head 

of British intelligence, directed that work be renewed against Soviet communications, 

especially KGB, GRU, and COMINTERN nets likely to carry information of 

counterintelligence value. 3 

In the United States, SIS was collecting a small amount of Soviet traffic on a casual 
basis as early as 1942. On 1 February 1943 the Army opened up a two-person Soviet 
section. The inspiration for this effort was the Army's successful attack on Japanese 
diplomatic communications, in which the Japanese discussed their efforts against Soviet 
systems. The Japanese material gave SIS some handholds into Soviet systems. OP-20-G 
came in later, opening both intercept and cryptanalytic study in July 1943. Because the 
USSR was a wartime aliy, the effort was rigidly compartmented and known to only a few. 
In August 1943 the Army and Navy cryptologists began cooperating on the new Soviet 

HANDLE VIA TALENT KEYHOLE COMINT CONTROL 3Y3TEM3 JOINTLY " 
Tim TTTTT TT ft *i A ftl . n mn w "" i ' n '' 1 " ' rm " 1 ' 1 ™ T * 




158 



DOCID: 3188691 

problem and, during 1943 and 1944, cooperatively worked a number of Soviet 
cryptographic systems. 4 

Meantime, the Navy, in order to collect Soviet naval traffic, had opened up an 
intercept effort at Bainbridge Island in Washington State. Tightly controlled, it was 
headed by Louis Tordella, later the deputy director of NSA. S 

By the end of the war, both cryptologic organizations were mounting extensive efforts 
against Soviet communications, despite the official designation of the USSR as an ally. 
OP-20-G, concentrating on Soviet naval communications in the Pacific from Skaggs Island 
and Bainbridge, employed 192 people, while ASA had almost 100. They had both been 
surreptitiously training Russian linguists for a year. 

But the effort was charged with political implications. Roosevelt was trying to 
maintain the fragile alliance with the USSR and was being challenged on the left by 
Henry Wallace, a potential political rival who felt the administration was anti-Soviet. 

In this atmosphere Brigadier General Carter Clarke of the Army G-2 paid a visit to 
Preston Corderman (chief, SIS) and Frank Rowlett several months before the end of the 
war. Clarke said that he had received informal instructions - allegedly from the White 
House - to cease any effort against the Soviet problem. It appeared that someone in the 
White House had gotten word of the compartmented Soviet problem and had concluded 
that it did not accord with the current diplomatic situation. (It was discovered years later 
that the White House staff was in fact infiltrated by a single Communist or "fellow 
traveler," who may have been in a position to know about the Army program.) Clarke did 
not desire that the program be closed, and in fact SIS (soon to be renamed ASA) received a 
steady increase in resources for the program. 6 

In June 1945, with the war coming to an end, the Navy proposed formal collaboration 
with the Army on the Soviet problem, which was then referred to as the RATTAN project. 
The Army wanted a more integrated effort, but they eventually agreed to organize under 
the more decentralized Navy scheme. 

At the same time, ANCIB proposed to LSIB that their cooperation against Germany, 
Italy, and Japan now be extended to include the USSR. The Americans proposed that- the 
cooperation be fully as close as it had been during the war. This included sharing all 
details, including the status and method of cryptanalytic attack, and the exchange of raw 
traffic and code/cipher recoveries. The British agreed, and in August the two sides arrived 
at an unwritten agreement predicated on an understandi ng arrived at in June betwe en 
Rear Admiral Hewlett Thebaud, chairman of ANCIB, an d] for 
LSIB. This historic agreement extended bilateral cooperation into the Cold War and 
established the basis for what became known as the BRl/SA Agreement. The two sides 
agreed to call the new project BOURBON. 7 

'(b)(3)-P.L. 

86-36 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 3Y3TEM3 JOINTLY 




DOCID: 3188691 

IOMKREfUI^RA 



Xb) (1) 

Ob) (3) -50 USC 403 
(6) (3) -18 USC 798 
(b'X (3J-P.L. 86-36 



During the mid-1940s the two sides mounted a relentless attack on the wartime 
generation of Soviet ciphers. The British provided much of the cryptanalytic expertise, the 
Americans most of the processing capability. They used whatever material they could get 
their hands on, including information on the Japanese cryptanalytic attack. TICQM 
debriefings of German cryptologists also gave the two partners useful information about 
Soviet systems. 



VENONA 

Alone and compartmented, the effort against Soviet diplomatic traffic had continued 
throughout World War II. In the long run this tightly held problem would have the 
greatest impact on American history in the postwar period and would become the most 
widely known. It was called VENONA. 

In the early years of the war, the Army received incidental Soviet diplomatic traffic, 
most of it through its arrangements with the cable companies, which carried a large bulk 
of common-user communications. Since New York was the terminal for the transatlantic 
cable, Soviet diplomatic traffic was routed through that city. The Army arranged with the 
cable companies to get copies of most of the cables that the Soviets were sending, both to 
and from Washington and, more important, to and from AMTORG. Much of this traffic 
was believed to be KGB-related. 

In 1943, ASA had mounted a secret effort to attack these communications, but they 
looked impossible. They were produced from codebooks enciphered by means of one-time 
additive tables. Assuming no re-use, there was no point in continuing. But ASA was not 
assuming anything, and Lieutenant Richard T. Hallock of ASA directed that his small 
section machine punch and process the beginnings and endings of some 5,000 messages to 
test for depths. In October 1943, ASA found the first indication that the additive pads 
may have been used more than once, a find which was to change the history of the postwar 
world. 9 

Hallock and his small band of cryptanalysts had found what is called "manufacturer's 
re-use" caused by the first German invasion of the Soviet Union in 1941. The KGB's 
additive pad generating facility produced two sets of some pads, presumably because of the 



HANDLE VIA TALENT KEVIIQLE COMINT CONTROL SYSTEMS JOINTLY 
NOT RBIiEASAQLE TO FOREIGN NATIONALS 




160 



DOCID: 3188691 




pressures associated with the rapid German advance toward Moscow. These were 
disseminated to widely separated KGB organizations, which were unaware that they had 
duplicate pads. ASA never found depths of more than two, and at that depth, decryption 
was only theoretically possible but practically a back-breaking job, assuming one ever got 
hold of the depths themselves. 

Months went by, but finally ASA cryptanalysts, in November of 1944, were rewarded 
with their first depth. This was followed by others, and it appeared that they might be able 
to eventually break some traffic. But the job still looked gargantuan. 

While one section worked on identifying depths, another worked on the underlying 
codebooks that were slowly emerging from under the additive key. This effort was led by a 
reclusive linguist and bookbreaker named Meredith Gardner. A Texan originally, 
Gardner had obtained a Master of Arts in German from the University of Texas and had 
been a Ph.D. candidate at the University of Wisconsin before going to work teaching at the 
University of Akron. He had joined SIS in 1942, and although he began in the German 
section, he quickly switched to Japanese, where he proved his linguistic gifts by picking up 
this extremely difficult language in just three months. At the end of the war, he switched 
again, this time to the Soviet problem and spent his first several months learning Russian. 
In December 1946, he had only recently emerged from language school when he made a 
major break into a KGB message, decrypting and translating a digraphic sequence of a 
1944 message from New York to Moscow sending English text. Gardner found that the 
KGB used the code values for "spell" and "end spell" anytime they needed to encrypt a 
foreign word or other term that did not appear in the codebook. It was these two values 
that yielded many of the early breaks. 

In December 1946, Gardner broke a portion of a KGB message that listed American 
scientists working on the atomic bomb. This message turned heads. Why would the KGB 
be interested in such information? ASA immediately turned the translation over to the 
Army G-2, and Carter Clarke had General Omar Bradley, the Army chief of staff, briefed 
on the message. G-2 expressed a continuing interest in any messages that contained like 
information. 10 

Through the war ASA had proceeded virtually unaided, but after World War II several 
outside factors speeded the tortuously slow process of additive key diagnosis and recovery 
and bookbreaking. The first was the defection of a Soviet GRU cipher clerk, Igor 
Gouzenko, from the Soviet embassy in Ottawa, in September 1945. The case caused a 
sensation because Gouzenko indicated the existence of a possible Soviet effort against the 
American atomic research effort. 11 

Because Gouzenko worked with communications, Frank Rowlett of ASA was invited to 
interrogate him. During his sessions Rowlett learned much about the way the KGB 
codebooks were put together and how the additives were used. This information cut time 
off ASA's cryptanalysis effort. 12 



HANDLE VIA TALENT KEYHOLE COMIHT CONTROL SYSTEMS JOINTLY 
NOT ItELEAGADLE TO FOREIGN NATIONALS 



161 tqbsectETuwjota 



DOCID: 3188691 



A second outside source of information was a 1944 FBI burglary of AMTORG, during 
which the agents carried off stacks of unenciphered messages with their cipher text 
equivalents. In 1948 the FBI turned over this bonanza to Gardner, who began comparing 
the traffic against transmitted messages. In this way he could identify some of the code 
group meanings because he had both plain and cipher texts. 13 

A third outside source was called "Stella Polaris," a Byzantine story which began in 
the early days of World War II. When, in June 1941, Germany invaded the USSR, the 
Finns went to war against the Soviets, siding with Germany against their mortal enemy. 
On 22 June a Finnish unit, presumably security police, entered the Soviet consulate in the 
Finnish town of Petsamo, near the Russo-Finnish border. Here they found the Soviet 
communications people frantically destroying cryptographic material. Some of it was 
burned beyond use, but certain of the codebooks were recovered more or less intact. These 
codebooks were property of the First Chief Directorate of the KGB - they were, in fact, the 
same codebooks which, in the mid-1940s, Meredith Gardner was working on. 

The charred codebook fragments were turned over to the Finnish COMINT service, 
headed by one Colonel Hallamaa. By 1944 the war was not going well for Germany, and 
Hallamaa became concerned about an impending Soviet invasion of his homeland. He 
arranged to smuggle the contents of the Finnish COMINT archives, including the Petsamo 
trove, to Sweden, where photocopies were made. Copies of the Petsamo materials wound 
up in the hands of the Swedish, German, and Japanese COMINT organizations. Along with 
the documents went Hallamaa and the entire Finnish COMINT service. 

At some point information got out to the newspapers, and the fact that Finnish 
intelligence people were working hand in glove with the Swedes became public knowledge. 
Knowing that the KGB was almost certainly after him, Hallamaa and most of his people 
fled to France, where, after the war, they worked nominally with the French intelligence 
people, but were actually controlled, according to some sources, by the British. So it was 
that the British got their own copies of the Petsamo codebooks. At the same time (1945) an 
OSS representative began working with Hallamaa, and the OSS, too, received its own 
copies (although not, perhaps, a complete set). 

The codebooks eventually made their way to ASA and AFSA. Since by this time a 
number of intelligence services had copies, which source did AFSA get? In the days after 
the war, a TICOM team obtained a copy from the Germans, and it was this set that first 
made it all the way to Meredith Gardner's office. Shortly thereafter AFSA began 
obtaining Petsamo materials from the British under the codename Source 267 and may, at 
some point, have received copies from OSS/CIG, but these were no more than duplicates of 
materials they already had. 14 




DOCID: 



3188691 



(b) (1) 

(b) (3) -50 USC 403 
lb) (3)-18 USC 798 
(b) (3J-P.L. 86-35 



The Stella Polaris find did not break the 
KGB codes. They were frag mentary and 
pertained only to one version, 



jBut they did shorten the time 




Wesley Reynolds served as a link 
in the NSA-FBI liaison and later 
became NSA's chief of security. 



involved in the laborious bookbreaking 
process by providing Gardner with "models" 
of Soviet codes on which to base his own 
recoveries. 

After reading some of Gardner's earlier 
translations showing the scope of KGB 
operations in the United States, Carter 
Clarke, the Army G-2, called on the FBI for 
help. His first contact was in July 1947; 
it was with Wesley Reynolds, the FBI liaison 
with Army G-2. Reynolds had joined the FBI 
in New York in 1941 after several years of law practice with his father and older brother. 
He had begun liaison work with G-2 in 1942, and ten years later jumped ship to NSA, 
where he became NSA's first professional chief of security. 

Reynolds concluded that VENONA could turn out to be.a full-time job, and he appealed 
to Mickey Ladd, head of the FBI counterintelligence operations, for a dedicated agent. 
Ladd assigned one Robert Lamphere, who, like Reynolds, had joined the bureau in 1941. 
Lamphere had worked virtually his entire career in counterintelligence, mostly in New 
York. He knew the territory, but he did not yet know ASA and Meredith Gardner. 

What ensued was one of the most remarkable partnerships in intelligence history. 
The shy, brilliant Gardner, speaker of half a, dozen languages, brought to the relationship 
his ability to break codebooks and produce translations of extremely difficult material. 
Lamphere brought his detailed knowledge of KGB operations and personalities, along 
with his contacts within the counterintelligence community. Together they worked over 
the fragmentary texts of old KGB messages. 

One of the first products of ..this marriage of convenience came in 1948. It was a 
decrypt of a message sent in 1944, in which the KGB reported on the recruiting efforts of 
an unnamed spy. Using the FBI counterintelligence file, Lamphere identified t wo possible 
candidates: 



an employee of the Navy Ordnance Department, and 



an engineer working on airborne radar for Western Electric. Both had been under FBI 
suspicion for possible Communist liaisons. Neither was ever brought to trial, but it was 
the first fruit of the Gardner-Lamphere relationship. 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SYSTEMO JOINTLY - 
NOT RELEASABLE TO FOItEIOH NATIONALS 



163 



TO^SJECflEfuiyhiRA 



/.(b) (6) 



DOCID: 



3188691 

JOMKREfUMBRA 



The next lead was a 1948 translation 
of a verbatim quote on the progress on the 
Manhattan Project given by one Klaus 
Fuchs, a respected British atomic 
scientist, also sent in 1944. The 
information became urgent when, in 
September of 1949, the USSR exploded its 
first atomic bomb. It became clear 
through the COMINT information provided 
by Gardner where the scientific 
information for the USSR's atomic bomb 
project was coming from. Fuchs was 
arrested in late 1949, confessed, and was 
convicted of espionage. Just as 
important, he led the FBI to a contact in 
America, Harry Gold, and Gold, in turn, 
led to the unravelling of an entire 
network of spies at work for the USSR. 




Klaus Fuchs 



As the atomic spy network was undone in 1950 and 1951, Lamphere played the 
information now pouring in through counterintelligence work and confessions against the 
AFSA KGB decrypts. Most important for Lamphere's subsequent work was an agent 
covername, ANTENNA/LIBERAL, whose true identity, Julius Rosenberg of New York City, 
was fully confirmed in June of 1950, based on a series of cascading confessions coming from 
the network originally unearthed during the Fuchs interrogations earlier in the year. 
(Gardner later contended that the original tentative identification of Rosenberg was 
actually done by G-2 before Lamphere became involved.) 15 

One of the most sensational spy trials was that of Alger Hiss, a top State Department 
official who had traveled with Roosevelt to Yalta in 1945. Fingered originally by a KGB 
defector, Walter Krivitsky, in 1941, Hiss was publicly named in 1947 as a spy by two 
reformed Communists, Elizabeth Bentley and Whittaker Chambers, before the House Un- 
American Activities Committee. He was never taken to court for spying, but in January 
1950 he was convicted of perjury for lying about his associations with Chambers, and he 
served a prison term. Although the evidence in court was all assembled from testimony 
and confessions, along with some circumstantial evidence produced by Chambers, VENONA 
traffic from the 1945 period contained possible confirmatory evidence that Hiss was 
probably a GRU asset. The covername ALES was identified in the March 1945 traffic as an 
individual who flew to Moscow after the Yalta Conference. Hiss was identified as the 
probable culprit based on the fact that there were only four other possibilities, including 
the secretary of state himself. The VENONA traffic refers to an individual who could fit the 
description of Hiss, which could confirm that Hiss was indeed a spy. 16 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 3Y3TEM3 JOINTLY 

NOTR.Ki,K/ ^ ri nTWTnrri i ii ii r ii i i iii nui-ni c i r 




164 



DOCID: 3188691 





Julius and Ethel Rosenberg (on right) shown with another accused spy, Morton Sobell 

The most famous spy of all was Kim Philby, the British MI-6 liaison officer assigned to 
work with the Americans on the VENONA project. VENONA also became the lever which 
pried open the Philby spy ring, and Philby watched it all unfold. He kept to himself until, 
in early 1951, the FBI went after one HOMER, the covername of a KGB agent identified 
originally in VENONA traffic. HOMER, the FBI suspected, was actually one Donald 
Maclean, a first secretary of the British embassy who, as part of his duties, was in charge 
of the coderoom in Washington. As such, he had passed the text of certain Churchill- 
Roosevelt messages to Moscow, and these appeared in decrypted VENONA traffic. Because 
of his position as liaison with the Americans on VENONA, Philby knew the axe was about to 
fall, and he warned Maclean of impending exposure. Maclean fled to Moscow with a fellow 
spy, Guy Burgess, who had been posted to Washington with Maclean. Brought under 
suspicion by Hoover's FBI, Philby resigned his post and in 1963 fled to Moscow himself. 17 



HANDLE VIA TALE1CI KEYHOLE COMIHT CONTROL 3TOTEM0 JOINTLY 




DOCID: 3188691 




Kim Philby strikes a smug pose during a 1955 press conference 
after a British investigation failed to definitely finger him as a Soviet agent. 

All the readable venona messages which supplied information about U.S. spies were 
transmitted by 1946 or earlier. Most of the decrypted traffic came from ASA's 1944-45 
files and was not decrypted until the late 1940s and early 1950s. But exploitation efforts 
continued for years and were not finally closed down until 1980. By then, the traffic being 
worked was thirty-five years old. The reason for this long delay was simple. VENONA 
translations were incredibly difficult, each one requiring approximately one man-year of 
work. 

The VENONA material played a key, although by no means exclusive, role in catching 
the atomic spies and the Philby ring. Most of the evidence came from meticulous 
counterintelligence work by the FBI, not from COMINT. VENONA frequently confirmed 
what the FBI had suspected, but it never had to be used in court. All the prosecutions 
stood solely on evidence gained from other sources. What, then, was its historical 
importance? 

First, VENONA provided the prod. Early VENONA decrypts revealed the scope and 
direction of KGB operations. It confirmed that fragmentary information provided by 
people like Krivitsky and Gouzenko, and public allegations by Elizabeth Bentley and 
Whittaker Chambers, was precisely on target and had to be pursued. With VENONA in 
hand, Lamphere got his marching orders. 

HANDLE VIA TALENT KEYHOLE COMINT CONTROL SYSTEMS JOINTLY 
NOT RELEADADLE TO FOREIGN NATIONALS 




166 



DOCID: 3188691 




Second, it was the evidence that led to the arrest and confession of Klaus Fuchs, the 
first atomic spy unmasked. Subsequent actions were taken based on an unravelling skein 
of evidence provided by the conspirators themselves. One arrest led to a confession, 
another arrest,. and still another confession. The investigation proceeded in whirlwind 
fashion, gaining momentum as it roared around every corner. At that point VENONA 
simply confirmed and solidified what the FBI had learned from its sources. 

Third, it began the exposure of the Philby spy ring, surely Britain's most infamous 
confrontation with traitors. Although the FBI was already onto Maclean, it might never 
have proceeded further but for the bits of information that VENONA was unearthing. At 
the very least, the ring would have operated months, if not years, longer before being 
unmasked. 

The guilt or innocence of Alger Hiss, the decision to execute the Rosenbergs, the 
culpability of the Philby ring, the very existence of the atomic spy ring and what J. Edgar 
Hoover called the "Crime of the Century" quickly acquired stark political overtones. They 
got all mixed up in McCarthyism, and in the 1960s the New Left took up the mantle in 
behalf of Hiss, the Rosenbergs, and a wide variety of others who, justly or unjustly, had 
been hauled before the House Un-American Activities Committee and the McCarthy 
hearings. In the early 1970s a National Committee to Re-Open the Rosenberg Case took 
up the cudgels in behalf of the executed couple. Believing that the documents would prove 
them right, they used the Freedom of Information Act to pry off the lid of the FBI 
investigation and began publishing articles purporting to show how the FBI materials 
proved that Hiss and the Rosenbergs were innocent. Then in 1983 two former true 
believers, Ronald Radosh and Joyce Milton, published a book entitled The Rosenberg File, 
which showed that a dispassionate examination of the documents proved just the opposite. 

What had they got hold of? It was FBI papers based on the VENONA translations. 
Unknown to NSA, the FBI had released them through the FOIA process (a release which 
led to a change in the way such FOIA requests are handled). 

Not many people still believe in the innocence of the Rosenbergs. Even those who hold 
firm to the belief that McCarthy's methods were wrong (and that encompasses most 
Americans) understand that the KGB had done some serious spying. McCarthy so 
sensationalized and distorted the anti-Communist campaign in the 1950s that an entire 
era came into disrepute. The historical importance of VENONA is that this entire episode in 
American history was not dismissed as a figment of someone's imagination. No matter 
how lurid and disreputable portions of the anti-Communist campaign became, the spy 
network can no longer be regarded as a fairy tale. 

As for its long-term significance for cryptology, NSA learned several important 
lessons. First, the difficulty of an effort is not an automatic disqualifier. VENONA was one 
of the most intensely difficult projects that American cryptology has ever undertaken. The 



HANDLE VIA TALENT KEYHOLE OOMIMT CONTROL BYSTEMO JOINTLY 
tjot pwi .v a g ft m v Tn irnnirTrw w »Trnu at n 



167 




DOCID: 3188691 




cryptanalytic effort was gargantuan. But the results would rock the foundations of post- 
war America. 

Second, it illustrated the absolute essentiality of cross-fertilization. COMINT without 
counterintelligence was just as unthinkable' as counterintelligence without COMINT. Yet if 
the effort had been undertaken during World War II, with the intense competition 
between the military services and the FBI, it might have fallen on the rocks of secrecy, and 
the atomic spies might never have been uncovered. 

"Black Friday" 



(AFSA had not yet been created, and / 

there was no mechanism to resolve interservice security squabbles and investigate/ 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL DYOTBMO JOINTLY' 

^OTpB'.i.B'AS'ftmiTTn ffnni ii i i iu i u ' a i i i -i iu at .rr <£> W_ 5o vsc 4Q3 

(b) (31-18 USC 798 
(b) (3)-P.L. 86-36 



J^E^eCffETUyflRA 168 



DOCID: 3188691 



i(b) (3)-P.L. 86-36 



But if one went looking for spies, there jtr&s no end 
of possibilities. The most obvious suspects were those three miscreants, Philb^r, Burgess, 
and Mac lean, who were in a position to know the general outlines of the American ] | 
pttack on Soviet systems, even though they were unacquainted with the technical 



details. j ., 

But a very likely contributor was one of America's own. . William Weisbsind, who had 
been working in ASA for the duration of the war and into the late ,1^40s, was later 
discovered to have been a KGB agent. Weisband, whose story will be covered in more 
detail in chapter 7, almost certainly provided information critical to the Soviet COMSEC 
effort. He was the U.S. cryptologic effort's first traitor. 

ASA and AFSA Turn to Radioprinter 



As thef 



source of/Soviet traffic. Through 



Iproble m became more difficult, ASA turned gradually to a new 
interrogations and later contacts with foreign 



COMINT specialists, ASA had become aware that the Soviets had begun using radioprinter, 



] 



ASA /had very little intercept capability for such a sophisticated system, and early 
intercepts were copied.onto undulator tape, whose readout was laborious and time- 
consuming. 

Confronting the same problem, NSG and ASA received a postwar allocation of 
something over $200,000 to design and build intercept equipment./ Working in the 
basement of Arlington Hall under the cafeteria, they began buildingP '' 



positions whose output was punched paper tape onto which was also 
printed the Cyrillic characters, a big improvement over undulator tape. (Printers were 
then viewed as too expensive and their output too.bulky.) f 




The outputs .were huge, and ASA and NSG were quickly flooded with Russian 
language material. NSAers Jacob Gurin and | who headed up the 

transcription effort, began hiring Russian linguists from a former OSS organization that 
had been transferred to the State Department. They also began scouring college campuses 
for linguists and set up language training at civilian universities. 



(b) (1) 

(b) (3)-50 USC 403 
(b) (3)-18 USC 798 
(b) (31-P.L. 86-36 




HANDLE VIA TALENT KEYHOLE COMINTCOJffBOfcSTSTEMS JOINTLY 
NOT RELEASABfeETCrPCREl^NATIONALS 



169 



DOCID : 



3188691 

TOESECRETtJfflgRA 



wave of the future. 



THE SOVIET STRATEGIC THREAT 



(b)Tl') 
(b) [3J 



The United States emerged from World War II with a lock on nuclear weapons 
technology and strategic delivery systems. The Soviet Union represented a threat only 
from the standpoint of a land war on the Eurasian landmass. 

This enviable pinnacle of security did not last very long. On 3 September 1949, an Air 
Force weather reconnaissance aircraft detected an unusually high concentration of 
radioactivity over the North Pacific east of the Kamchatka Peninsula. The Soviets had 
exploded a nuclear device. The timing was a shock. The intelligence community had 
adjudged the Soviet program still several years away from actually exploding a device. 

The arms race was on, and America's lead in nuclear technology seemed to be 
disappearing. The U.S. exploded its first hydrogen bomb in 1952; the Soviets followed a 
year later, another surprise to the intelligence community. 

In 1953 American military attaches in Moscow observed Soviet strategic bombers in 
apparent series production. If true, this would give the Soviets a delivery capability for 
their newly acquired atomic weapons. Stuart Symington, senator from Missouri and 
former secretary of the air force, fastened on this information to propound the famous 
"bomber gap" thesis. This information was later proved wrong by early U-2 
photoreconnaissance flights, but the public perception profoundly altered intelligence 
priorities and led to an almost paranoid focus on Soviet strategic systems. 

In 1956 Symington originated the "missile gap" controversy which was to influence 
the presidential election of 1960. Symington was apparently being fed data from Air Force 
sources that SAC believed the Soviets might have slipped ahead of the United States in 
the development of strategic missile delivery systems. The launch of Sputnik in 1957 
appeared to confirm Symington's contentions, and every failure of a U.S.-developed launch 
system over the next several years just drove another nail in the lid. The concentration of 
intelligence energies on the Soviet advanced weapons problem became fierce. 



Printer seemed to be the; 



(b) (1) 

(b) (3) -50 USC 403 
(b) (3)-18 USC 798 
(b) (3)-P.l. 86-36 



HANDLE VIA TALENT KEYHOLE COMINXGOSffltOOTYSTEMS JOINTLY 
NOT EELEASABfeBTtrfOBEIGN NATIONALS 



170 



DOCID: 3188691 




How It Began 

The Soviet" missile program had originated in 1945 when a covey of German missile 
scientists fell conveniently into Soviet hands. Working at Peenemunde on the North Sea 
coast, this group had developed the VI and V2 missiles, the latter a true ballistic missile 
capable of distances in excess of 200 miles. The captured scientists were hustled off to a 
research institute in Bleicherode, East Germany, and then in 1946, amid great secrecy, 
were transferred to the Soviet Union itself. They were first set up in a new Scientific 
Research Institute 88 at Kaliningrad on the Baltic Sea. Their first test center, established 
in 1947, was at a remote desert site called Kapustin Yar, some 100 miles east of 
Stalingrad. 

The Germans labored in Kaliningrad, Kapustin Yar and other locations until 1950 or 
1951. By that time the Soviets had themselves the rudiments of a missile program. They 
had succeeded in replicating the V2 and a primitive indigenous missile, called the R-10, 
had been been designed with German help. At that point the Soviets returned the 
Germans to their homeland, where they brought the CIA up to date on the Soviet program. 
None of the first Soviet rockets, designated R10-15, ever amounted to more than "designer 
toys," but the most advanced, the R-15, was designed for a nuclear payload and was to 
have a range of 3,700 statute miles. 20 

Reports of Soviet missile development reached the Oval Office, and the president 
demanded more information. But there were precious few assets to be had. In. the latter 
days of Stalin's reign, the Iron Curtain completely closed off the Soviet Union from CIA 
HUMINT penetration - they had no secret agents in the USSR. There was no photography, 
the U-2 still being several years away. Virtually the only asset available was SIGINT. 



, I In 1954 the 

German scientists who had worked on the project told American intelligence about a 
system of communications between the missile and its ground station, a derivative of a 
system the Germans had developed at Peenemunde in World War II. It was a 16-channel 
PPM system operating in the 60 MHz range that the Germans called MESSINA. The U.S. 
intelligence community called it "telemetry. " 2l 

'(b) (1) 

(b) (3) -18 USC 798 
(b) (3)-50 USC 403 
(b) (3)-P.L. 86-36 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 3Y3TEMB JOINTLY 
NOT REXEASABLE TO FOREIGN NATIONALO 



DOCID: 



3188691 




Missile fabrication and assembly area, 
(b)(1) ... Kapustin Yar. This 1 959 U-2 photograph provided excellent 

(b!(3)-50 USC 403 T™-"m~- =~-,™._,j«J 

(b)(3)-P.L. 86-36 detailonarang.compl«| 



HANOLE VIA TALENT KEYHOLE 00MINT CONTROL S YSTEMS JOINTLY 
??0T RELEACABLE TO FOREIGN NATIONALS 



■TOP SECRET UMDRft" 



172 



DOCID: 3188691 b11 ' 



fbl (31-50 USC 403 
(is) (31-P.L. 86-36 



DOCID: 3188691 



jrop-jrrnmiMiinfl 



(b) (1) 

(b) (3)~P.L. B6-36 
(b) (3)-50 USC 403 



i(b) (1) 
(b) (3) 
fOGA 



The American Response 




HANDLE VIA TALENT KEYHOLE COMINTCOJQKQfcSYS'fEMS JOINTLY 
NOT RELEASABfeEWflOMilGN NATIONALS 



DOCID: 3188691 



jnn SEcnn umuhA'7 



In 1957 th e Soviets opened a new, ran ge at Tyura Tam, sonie 700/miles east of 
Kapustin Yar. J [ that this would be theiite for the Soviets' first i 

ICBM launches, and a CIA -driven search through U-2 photograpfry in the summer of 1957 f 



rcv 
1 



onfirmed this. 26 



J 1 



J Moreover J/ |became more and more a cue card for U-2 



missions. When U-2 pilot Francis Gary Powers was shot down in I960, he was on a 





/ 







ftiich had been recently identified 



as being 



level. By iyh8 it had 



;^his discovery led to the elevation of the problem to division 



iecome the Advanced Weaponry and Astronautics Division; 



j |which cdncehtrated NSA's resources into a single .organization. It came to be referred to 



(b) (1) 

(b) (3)-P.L. B6-36 
(b) (3) -50 USC 403 



HANDLE VIA TALENT KEYHOLE COMINX£OW¥ROCS¥STEMS JOINTLY 
NOTREJ-EASABaTTOFOREIGN NATIONALS 



175 



__JO£ 'trcnrT urgmTfTT 



DOCID: 3188691 



TOPSE 



'(b) (1) 
(b) (3)-P.L. 86-36 
(b) (3)-50 USC 403 
(b) (3) -18 USC 798 



as "SMAC" (Soviet Missile and 
Astronautics Center) 



lb) (1) 
tb) (3) 
OGA 



JSMAC established a 




Joseph Burke 

In both concept and 



new operator-to-operator communica- 
tio ns system wh ich became known as 

-the Joseph Burke, now 

regarded as the "father of SMAC," is 
believed to have originated this 
system. 30 

To orchestrate the system, SMAC 
established an all-night watch, 
virtually eliminating the call-in 
system for this critical project. SMAC 
was one of the organizations that 
eventually got NSA out of the eight- 

hour-per-day mode, and it pioneered in r 

the development of tip-off systems and quick reaction capabilities, 
technology, it long preceded NSOC. 31 

NSA had numerous competitors in the missile arena. The Air Force had launched a 
small detachment of ATIC (Air Technical Intelligence Center at Wright-Patterson Air 
Force Base, Ohio) in San Antonio. Collocated with Air Force Security Service, SMTIG 
(Soviet Missile Technical Intelligence Group) consisted of a cross-section of the Air Force 
intelligence disciplines, but it was dominated by SIGINT people. Its analysis directly 
overlapped much of what NSA was doing. In addition, CIA was well along on its missile 
analysis effort and included SIGINT as well as other intelligence disciplines in its 
program. * 

The Soviet Atomic Bomb Project 

While the Soviets were developing delivery systems, Stalin directed that the 
development of the nuclear weapons themselves be given the highest priority. Working 
with information provided by the atomic spies in the West, and with captured German 
nuclear physicists, the Soviets raced to get the bomb. Their first test site was constructed 
at Semipalatinsk (now referred to as "Semey"), a remote Siberian location, and for some 
years the Soviets used that site exclusively. The Semipalatinsk monopoly on nuclear tests 




HANDLE VIA TALENT KEYHOLE COMINT CONSfiOI^B¥STEI5S JOINTLY 
NOTRELEASAmJB^e^tJRElGNNATIONALS 



DOCID: 3188691 



.5<b) (1) 
*S(b) (3) 
U OGA 



was finally broken in 1955 with the explosion' of an IjinderVater device in the sea off 
Novaya Zemlya, a large Arctic island northeasfrof the Kola Peninsula. 33 



As with the missile development program, so it was iwith nuclear weaponsj " 



The American system for monitoring Soviet nuclear tests consisted of a complex of 
seismic and infrared sensors positioned ai/ound the world. The entire system depended. 



The bomber and missile gap controversies in the late 1950s triggered a search for an 
operational Soviet strategic nuclear delivery orga nization. With the launch of Sputnik in 
October 1957, this became a white-hot priority,! ~~~ 



(b) (1) 

(b) (3)-P.l. 8S-36 
(b) (3)-50 USC 403 
(b) (J) -IB USC 796 



The Soviets did not yet 

have a nuclear delivery organization, all the information from Senator Symington 
notwithstanding. In January 1960 the U SSR publicly announced the formation of a new 
Strategic Rocket Forces (SRF) command,! 



In 1960, DCI Allen Dulles directed that the chairman of the Guided Missile and 
Astronautics Intelligence Committee (GMAIC) organize a study gro up to completely 
evaluate the Air Forte contention that there was a missile gap. Using l | 
photog raphic eviden ce collected from the U-2, the committee concluded that only the test 
site at was capable of launching a. jnissile. This contradicted the latest 

national intelligence estimate, which postulated that there would be thirty-five 
operational launchers by midrl96d! Dulles then directed that a permanent Deployment 
Working Group be established to comb all the evidence thoroughly. 

The crash of the U-2 piloted by Francis Gary Powers on 1 May temporarily ended 
overhead photography as a source of intelligence, and the committee had to proceed fr om 

Using old ^ photographs..and.uprtor.the'minut ej 



the 



HANDLE VIA TALENT KEYHOLE COMINT COf 

NOT RELEASABfc&¥OTTjlSlGN NATIONALS 



JOINTLY 




177 



DOCID: 3188691 



••' (b) (1) 
(b) (3J-P.L. 86-36 
(b) (3)-50 USC 403 
(b) (3J-18 USC 798 



TQ| 



RET UMBRA 



group finally concluded that only Tyura Tarn and possibly one to three other operational 
launchers e xisted, including Verkhnyaya Salda and Yur'ya. Plesetsk was still assessed as 
unfinished. 



The paranoia of the 1950s receded to be replaced by the optimism and military forci? 
projection policies of the 1960s. By the time Kennedy became president, Dulles had proved\ 
that the Soviets still presented ho real strategic nuclear threat, although clearly that ' 
threat was on the horizon, During the dark days of the 1950s, though, when no one really 
knew what went on behind the Iron Curtain, 



It was President Eisen 



lower's hole card. 



The Chinese Threat 



Compared with the Soviet Union, China could hardly be considered a strategic threat. 
But Stalin and Mao appeared to be on friendly terms. China had intervened in Kored, and 
many Americans (including some in the intelligence business) believed in an overarching 
Communist conspiracy - the Sino-Soviet Bloc. If Stalin had the bomb, could Mao be far 
behind? \ 

American suspicions of a close Sino-Soviet relationship were confirmed through 
COMINT by the exploitation of COMINTERN communications. This traffic showed a long- 
standing liaison between the COMINTERN and Mao's forces, going back to the 1930s. 
When, in the late 1940s, ASA first began exploiting Soviet plain-language printer, 
analysts discovered that the Soviets were sending World War II lend-lease equipment to 
Mao, who was then attempting to overthrow Chiang Kai-shek. Clearly, the USSR was the 
major arms supplier for the Chinese armies, and the Soviets had nuclear weapons. 38 

During the 1954 Quemoy and Matsu crisis, Secretary of State John Foster Dulles 
pledged American arms in defense of Formosa. The pledge was repeated during the 1958 
renewal of the offshore islands imbroglio, but Dulles persuaded Chiang to renounce the 
use of force against the PRC, and the islands never again caused a confrontation between 
the U.S. and China. 39 Meanwhile, however, U.S. intelligence poured ever-inereasirig 
resources into the China problem. i 

In many ways, China resembled the USSR I 



resources to go against the second-most-serious threat were scarce. 



The Chinese program was delayed for several years by the Sino- 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SYSTEMS JOINTLY 
NOT RELEAFflfif T, T" F f hi I'll! Mil 1 1* ' I 1 1 1 h IT** 




178 



DOCID: 3188691 



TOP 



BRA 



(b) (1) 
!b) (3) 
jiOGA 



(b) (1) 

(b) (3) -50 USC 403 
(b) (3)-lB USC 798 
(b) (3)-P.L. B6-36 



Soviet rift, 
not make r/apid progress until the 1960s. 



China's strategic defense system did 




The Early Days of Overhead 

The early days of the new Eisenhower administration represen ted the blackest period 
for U.S. intelligence on Soviet forces and strategic capabilities. 



United States could noft.penetrate the Iron Curtain 
it from the air. 



If the 



they would have to do 



Attempts had already been made. In the late 1940s the CIA had tried to float high j 
lloons over the USSR, equipped with cameras and recorders. This so-called j 




rogram failed dismally. The few balloons that floated all the way fron 



yielded little useful information.' 



More determined were deliberate overflights of Soviet soil. SAC had a highly 
compartmented (and still obscure) overflight program, carrying a variety of sensors. This 
dangerous approach to intelligence collection was augmented by the RAF, which mounted 
occasional overflights. But their participation was limited and ended after one famous 
incident in 1953. At American behest, RAF aircraft over flew Kapustin Yar,[ 



They - came i back with their 
planes shot full of holes and allegedly told the Amer icans that if they wanted that sort of 
thing done, they could jolly welljdo it themselves. 



A series of ground-breaking studies in the early 1950s urged Eisenhower to plunge 
into advanced technological alternatives. One of the most attractive proposals was 



HANDLE VIA TALENT KEYHOLE COMINTCQEilBdirSTSTEMS JOINTLY 
NOT RELMSABtiBTOTOK^GNNATIONALS 



179 



TOP SKBJrPtflfiBRA 



DOCID: 3188691 



(b) (1) 
!b) [3) 
OGA 



suggested by the Surprise Attack Panel, a committee set up under Dr, James R. Killian, 
president of MIT. Dr. Edwin Land, a member of the panel and inventor of the Polaroid 
camera, suggested that a camera could be devised which could take pictures from very 
high altitudes, if the Air Force could build an airplane from which to mount such a 
camera. In November 1954, Allen Dulles got bo build some thirty new aircraft 



which had been designed for just such a purpose by Kelly Johnson, the top designer at 
Lockheed. They were called U-2s. 44 

There was at the time no guarantee that the U-2 was the answer. In fact, the 

Eisenhnwpr ariminigt.ratinn i-nntiniioH tn nTav yntVi the balloon Option. ..Project 



consisted of more than 500 bal 



oons wnieft 



jrej» Jloated-roi^'lEir USSR from Europe to Asia in early 1956. 



them may have 
successfultharl - 



But 



land some of 



was no more 



and of the 500, only forty-four were ever recovered after their 



long ride from west to east. 45 

The U-2 project was a very risky gambit by an administration desperate \to find out 
what was happening in the Soviet Union. Advanced equipment was placed 'aboard ar; 
aircraft easily picked out on radar, and defensible only because of its operational altitude 
If the Soviets ever got a weapon that would shoot that high, the U-2 could be : a sitting 
duck. \ j 

This was undoubtedly in Eisenhower's mind when in 1955 he brbached the Open Skies 
proposal to Khrushchev. The U-2 had not yet been launched, but when it was, it would be 
a target. 46 

\ \ \ 

From the time of the first. U-2 overflight on 7 April 1956, to the shootdown of iFrancis 
Gary Powers on 1 May 1960, the Eisenhower administration launched twerity-foiir 
missions. The objective was photography, and the targets related to Soviet strategic 
systems. The aircraft also carried ari l j package, but this was probably used f0r 
internal defense (presumably to warn the aircraft of the pr esence of unfriendly threats) 
and to target the cameras. \ \ 




DOCID: 3188691 



;(b) (l) 

tb) (3) -50 USC 4 03 
ib) (3)-P.L. 86-36 



..-•""(b) (1) 
" (b) (3) 

OGA . 



DOCID: 3188691 



•'/(b) (1) 
(b) (3) 
OGA 



Prior to the Powers flight, NSA began to note increased! 



Henry Fenech, the NSA dfficial in charge of the 

operation, stated that a mission just priof to the infamous May Day flight was chased by a 
Soviet interceptor aircraft all the way. trt Afghanistan. It was obvious to Fenech that the 
Soviets were loading up. 49 : Powers took off on 1 May 1960,1 



Back at NSA, Fenech reported to CIA that the aircraft 



had probably been lost to unexplained causes. It was the first loss of a U-2. f 



CIA was desperate to know what had really happened to the aircraft, and in early 1962 
General C. P. Cabell, deputy director of the CIA, decided to trade Soviet spy Rudolph Abel 
for Powers. In March 1962, only a month after the return of Powers, CIA called a board of 
inquiry, and into the middle of it marched Fenech, accompanied by NSA Director 
Laurence F rost. Deputy Director Lou is Tordella, and Assistant Director for Production 
Oliver Kirby 



Both the S oviets and Powers said that the plane had been shot down at high altitude 



with an SA-2. 



Fenech 



told CIA that it appeared Powers had begun a descent well before the SA-2 hit. Had he 
gone to sleep? Was it inattention or hypoxia? Did he fl ame out and search for a lower 
altitude to restart his engines? All Fenech knew was that\ : 



Fenech did not 

believe what Powers had told CIA. The CIA crowd was not amused, and Fenech 
underwent a long and hostile grilling by the board. 



(b) (1) 

(b) (3)-50 USC 403 
(b) (3)-18 USC T98 
(b) (31-P.L. 8S-36 



^h a t -really happened?... We will probably never know. Powers died in a helicopter 
crash in 1977, so no more information is available from "turn: "But the 



HANDLE VIA TALENT KEYHOLE COMINTCOjaaBOtrSTSTEMS JOINTLY 
NOT RELEASA»i*TrrP6^EIGNNATIONALS 



183 



TOPJECRPRflSIfiRA 



DOCID: 3188691 




leaned so heavily on was suspect. 



I Moreover, the Soviet officer who was in charge of the SAM 

battery that supposedly shot Powers down stated after the end of the Cold War that the air 
defense operators were so shocked at the shootdown that they didn't believe it, and for 
twenty minutes or so they continued to reflect the aircraft on its presumed track to cover 
up their befuddlement. 53 If the Soviet defenders did not know for sure what had happened, 
and if they covered up information so as not to look bad up the line, the chance at ever 
arriving at the truth looks very dim indeed. The theory that he was downed by an SA-2 at 
very high altitude (68,000 feet) appears more plausible today than it did in 1960. j 



THE ATTACK ON SOVIET CIPHER SYSTEMS 



— rf(b) (1) 

/ / (b) (3)-50 USC 403 
/ / (b) (3)-18 USC 798 
; (b) (3)-P.L. 8S-3S 



Baker Report, 1958 



When it was created, AFSA inherited a Soviet problem that was in miserable shape 



There were only two bright spots. The first was unenciphered radioprinter, which 
carried valuable |~ information. These links had not 

yet begun to go to cipher. | 



Even the darkest days, however, had their rays of hope. Howard Engstrom, a World 
War II cryptologist now in the civilian computer business, suggested in 1950 that AFSA 
might make progress by establishing a research institute comprising eminent civilian 
scientists to attack the problem, very much in the pattern of Los Alamos of the Manhattan 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SYSTEMS JOINTLY 

Tjrvrpii'T trftqftwi KTf>rrmT i T r itTn i i i TT n iTriT i — 



184 



DOCID: 3188691 




Project. 54 Then, two years later, AFSA's Scientific Com munications Advisory Group 
(SCAG, a predecessor of NSASAB), chaired by Engstrom, 

, \given sufficient resources 

and a strong research and development effort. The need for a skilled civilian work force or 
the employment of an outside research institute was essential. AFSA did not have a 
strong enough civilian work force, and the Brownell Committee made this point forcefully 
that same year. 55 



'(b) (1) 

(b) (3) -50 USC 403 
(b) (3) -IB USC 79B 
(b) (3)-P.L. 86-36 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 3Y3TEM3 JOINTLY 
MOT BELEAEADLE TO FOREIGN NATIONAL3 



185 TORSECftTT U Mb RA 



DOCID: 3188691 



?(b) (1) 
(b) (3) -50 USC 403 
(b) (3)-18 USC 798 
(b) (3)-P.L. 86-36 




As NSA struggled with the 



/problem, two camps formed] 



concerning the prospects for success! The first group felt that the effort was hopeless and 
should not be funded. The 1957 Baker Pa nel leaned toward this viewpoint. The committee! 
recommended that an effort be kept alive 



]but it was pessimistic about long-range chances for success. 



A second group felt that the United States would never know whether it would bej 
possible or not because of inadequacies at NSA. /the organization was too skewed toward;! 
military mannin g, was not hiring the right /kinds of civilians, and did not have arj 
adequate budget. 



This opinion was well entrenched at CIA/and was led by former NSAer Frank 
Rowlett. A variant on this interpretation was offered by the Baker Panel, which suggested 
that the internal NSA structure could hot cojte with the complexities of high-grade 
systems. That job should be given, entirely io a Los Alamos-style civilian research 
institute. 62 

But within NSA itself there, v?as a strong undercurrent of disagreement with both 
camps. Representative of this yie>v was the report of a committee chaired in 1956 by Navy 
captain Jack Holtwick. Holtwick felt that a concentrated attack would yield enough 
I / , [alone to justify the effort, and he recommended a 



massive computer attack: /Such a super-high-speed computer would cost in the 
neighborhood of $5 million per year, a considerable sum in those days. 



needj" 



/ | NSA would 

would probably have to ha ve some of the work done at a private 



research organization (the Los Alamos option again). 



a 



HANDLE VIA TALENT KEYHOLE OOMINT CONTROL 3Y3TEM3 JOINTLY 
■MOT B i ffTnffi ft i SABLljl TO FOHEIQH NATIONALS 



186 



DOCID: 3188691 



TPMSCRlfuMI 




TRACKING SUBMARINES - THE STORY OF BURST TRANSMISSIONS 

Late in World War II, German scientists had once again come up with a serious threat 
to Allied cryptologic efforts. This time, they had devised a way to compact lengthy manual 
Morse messages into messages lasting only a few seconds. When played at normal speed, a 
message sounded like a burst of noise in the receiver. The Germans called it KURIER and 
intended it to be on submarines, agents (spies), and eventually aircraft for low-probability- 
of-intercept communications. Early models were deployed before war's end, and GCCS 
intercepted transmissions on at least one occasion. Fortunately, however, KURIER was still 
in the experimental stage. 

When the war ended, a German submarine surrendered in Argentina, the nearest 
landfall. Aboard the sub was a German scientist with extensive engineering notes and 
knowledge of the system, and he was willing to talk to the Americans about it. Even 
luckier, the British captured an actual KURIER system, and both the British and 
Americans experimented with it, primarily for the purpose of building burst systems for 
their own submarines. 65 

Unfortunately, the Soviets also captured German scientists working on KURIER, and 
the ticom teams discovered this during their debriefing sessions. At the time, the Navy 



(b)(1) 



(b)(3)-50 USC 403 
(b)(3)-18USC798 
(b)(3)-P.L. 36-36 



HANDLE VIA TALENT KEYHOLE GOMIWT ' CONTRQL 3Y3TEM3 JOINTLY 
NOT TTffil SASABLE TO FOItEION HATIOKALO 



187 




DOCID: 3188691 



%b) (1) 

'(b) (3) -50 USC 403 
fib) (3)-18 USC 798 
(b) (3J-P.L. 86-36 



DOCID 



(b) (1) 

(b) (3)-50 USC 4 
(b) (3)-18 USC 7 
(b) (3)-E.L. 86- 



DOCID: 3188691 



(b) (3)-P.L. 86-36 



TOMKKffujyrfjRA 



(b) (1) 

(b) (3) -50 USC 403 
(b) (3)-P.L. 86-36 



Notes 



'Soviet Manual Systems Since 1946: A History of Their Cryptography, Usage and 

Cryptanalytic Exploitation"; unpublished draft available in CCH. 

2. Ibid; see also Frank Rowlett, "Recollections of Work on Russian," unpublished manuscript dated 11 Feb.\l965, 
available in CCH; see also NARA, SRH-001 , 296. 

\ 3. Robert L, Benson and Cecil Phillips, History ofVenona, published in March 1995. The name "KGB" wiU be 
\ used throughout this book to refer to the Soviet intelligence organization and its predecessors, the MVD and 
\ 'NKVD. \ 



xf'Befbre BOURBON: American and British COMINT Efforts against Russia and the 



\4. 

Soviet Union Before 1945," Cryptologic Quarterly, Fall/Winter 1993, 1-20; Benson and Phillips, Venona; Frarik 
Rowlett, "The Story of Magic," Ch. VII, 53; manuscript available in CCH. \ 

5. Rowlett, VII.53.; Oliver R>Kirby, "The Origins of the Soviet Problem: A Personal View," Cryptologik, 
Quarterly. Vol II, No. 4, Winter 92; ; Louis W. Tordella, series of oral history interviews beginning 28 June 1990\ 
by Robert Farley, Charles Baker, Tom Johnson and others, NSA OH 8-90. \ 

6. Rowlett, "Recollections . . " ; see also Oliver R. Kirby oral interview, 11 June 1993, by Charles Baker, Guy \ 



Vanderpool, 



7. Howe, "Narrative History of AFSA/NSA, Part I 



and David Hatch, NSA OH 20-93. Tordella interview. 

Early BOURBON," 1994. 



9. Benson and Phillips, Venona. 

10. Benson and Phillips, Venona; Kirby, "The Origins of the Soviet Problem." 

11. Robert T. Lamphere, and T. Schachtman, The FBI- KGB War, a Special Agents Story (New York: Randon 
House, 1986. 

12. Benson and Phillips, Venona. 

13. Lamphere and Schachtman, 78. 

14. For information on the Petsamo Incident and the Stella Polaris project, refer to the following: Lamphere and 
Schachtman (not the best source); interview with Hallamaa in Madrid in 1951, in NSA/CSS Archives, ACC 
7975N, CBRJ 22; Benson and Phillips, Venona, Stella Polaris document collection in NSA/CSS Archives, ACC 
1 177-79, 11369-76, 12504, 19043N, 19044, CBRJ 23. 

15. Benson and Phillips, Venona. 

16. Ibid. 

17. See David Martin, Wilderness of Mirrors (New York: Ballantine Books, 1980). 

18. Brownell Report, 106-08, in CCH Series V.F.7.13. 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 0Y3TBM0 JOINTLY 
NOT R.EI .F. A g A m P Tn PnnT?Tr.T»T t.j » miniT . t n ., 




DOCID: 3188691 



]?{b) (3)-P'.L. 86-36 



19. No history of Black Friday was compiledat the time, partly bec ause of the fragmented nature of cryptology in 
those days. The best versions have Only recently been compiled: f / j^ Beyond BOURBON X 

1948. The Fourth Year of Allied Collaborative COMINT Effort Against the Soviet Vnioii? Cryptologic Quarterly^ 
Spring 19 95; and Bens on and Phillips, Veno na^Mt additional information, see orifrinterview with | | 
| t OMay 1985 by | | and Robert Farley, NSA OH 03-85; or.$$story interview with CecU 

J. Phillips, 8 July 1993, by Charles Baker and Tom Johnson, NSA OH 23 r 93; oral history interview with Herbert 
L. Conley, 5 March 1984, by Robert Farley, NSA OH 01-84; and Oliver R., Kirby, "The Origins of the Soviet 
Problem " 



20. Details of the early Soviet program can be found i: 
Program (1945-1953)," Spectrum, V (Summer 1975), 12-19; 



it 



[35arly History of the Soviet Missile 



The Soviet Land- Based Ballistic Missile 



Program, 1945-1972: An Historical Overview," unpublished manuscript available in CCH, 



21 



The Soviet Land-Based Ballistic Missile Prigram. . ./ 



26. Oral interview with Ray Potts and 



16 May 1994. 



29. Walter Laqueur, A World of Sedrets: The Uses and Limits of Intelligence. (New York: Basic Books, Inc., 
Publishers), 143-44. 



30 



| [ the Soviet Land-Based Ballistic Missile Program. . . ." 



31. Tevis interview. 

32. Amato interview. 
33 



History of the Soviet Nuclear Weapons Program," intelligence report available in CCH. 



38. Kirby interview. 

39. O'Neill, 279. 

40. Background papers for the 1967 Eaton Committee, available in CCH; oral interview with Milton Zaslow, 14 
May 1993, by Charles Baker and Guy Vanderpool, NSA OH 17-93. 



(b) (1) 

(b) (3) -50 USC 403 
(b) (3)-P.L. 86-36 

IIAJTOLE VIA TALENT KEYHOLE COMINT CONTROL 3Y3T - HM3 JOINTLY 
NOT BELEASABLE TO FOREIGN NATIONALD 




DOCID: 3188691 




41. Ray S. Cline, The CIA under Reagan, Busk and Casey (Washington, D.C.: Acropolis Books, 1981), 200-201; 
"Report of the Secretary's Ad Hoc Committee on COMINT/COMSEC," June 1958 (Robertson Committee), CCH 
Series VI.C.1.11.; "Tibetan Revolt of 1959," informal paper prepared for Eaton Committee in 1967, available in 
CCH. 

42. Burrows, Deep Black, 62-3. 

43. Burrows, Deep Black, 67; Michael R. Beschloss, Mayday: Eisenhower, Khrushchev and the U-2 Affair (New 
York: Harper and Row, 1986), 77-79; Oral interview with Henry R. Fenech, 30 Sep 1981, by Robert Farley, NSA 
OH 8-81. 

44. Stephen A. Ambrose, Eisenhower, Volume 2: The President (New York: Simon and Schuster, 1984), 227-28. 

45. Burrows, Deep Black; NSA/CSS Archives, ACC 24355, CBOH 36.; Ambrose, Eisenhower, 309-10. 

46. Ambrose, Eisenhower, 266. 



53. Vox Topics, V. 3, # 3, 1992. 

54. CIA-AFSA collaboration (Wenger file), in ACC 9142, CBIB 27. 

55. Collins, V. II, 6; Browne!! Report. 



61. Baker Panel report. 

62. Collins, V. II, 16, 23. 

63. Holtwick. 



(b) (1) 



(b) (3J-P.L. 86-36 
(b) (3)-50 USC 403 
(b) (3) -18 USC 798 



HANDLE VIA TALENT KEYHOLE OOMINT CONTROL 3YBTEM3 JOINTLY 
NOT ItELEAOADLE TO FOREION NATIONAL3 




192 



DOCID: 3188691 



(b) (3J-P.L. 86-36 



65. NSA/CSS Archives, ACC 3838, CB0H11; OTtoiurk'e interview; oral interview witl] ' [17 July 

1986, by Robert Parley and Tom Johnson, NSA QH 1 9-86:; NSA/CSS Archives, ACC 3838, CBOH 1 1L. 

66. CCH Series V.R.1.7;V.B.2.7. 



67 

paper available in CCH; NSA/CSS Archives, ACC 3838, CBOH 11. 
68. 



Radio Direction Finding in the U.S. Navy: the First Fifty Years," 



69. 
85 



jHistory of HFDF in the Pacific Ocean Prior to the Advent of Bullseye," 1981, in CCH Series VII 



(b) (1) 

(b) (3)-P.!. 86-36 
(b) (3)-50 USC 403 
(b) (3)-18 (JSC 798 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SYSTEMS JOINTLY 
MOT RELEASABLE TO FOItEIdH NATIONALS 




DOCID: 3188691 




Chapter 5 
Building the Internal Mechanism 



CRYPTOLOGY IS AUTOMATED - 

THE STORY OF EARLY COMPUTERIZATION 

The trouble with machines is people. 

Edward R. Murrow, 1952 

Antecedents 

Modern cryptanalysis, with its emphasis on the manipulation of large amounts of 
data, was one of the earliest government enterprises to acquire the new office automation 
equipment being produced by a small company called International Business Machines 
(IBM). In 1931, OP-20-G obtained some of the new IBM machines and quickly employed 
them in the cryptanalytic process to sort large amounts of data and determine likes and 
unlikes. In 1935 Signal Intelligence Service (SIS) acquired the same type of equipment for 
the same purpose. By World War II "EAM" (electronic accounting machine) equipment 
had become commonplace in COMINT processing, and it contributed mightily to 
codebreaking, especially in the Pacific Theater. By the end of the war, OP-20-G and SIS 
combined were using more than 700 IBM-type machines. 1 

Of the two, the Navy seemed to be further along. During the 1930s and into the early 
war years, OP-20-G had attempted a partnership with Vannevar Bush, the renowned MIT 
(Massachusetts Institute of Technology) scientist, to build a faster comparator for analytic 
(read cryptanalytic) use. This rather bumpy relationship had so far yielded a number of 
notable technological and administrative failures when, in 1943, OP-20-G became a 
partner with GCCS in running attacks against the four-rotor German naval ENIGMA. They 
ultimately decided on a huge, clunky mechanical marvel which has been dubbed the 
"American bombe," A technological dinosaur when compared to the devices Bush was 
experimenting with, the bombe at least worked and was used in the last two and a half 
years of the war to break German naval ENIGMA keys. The Navy development and 
contract monitoring operation was called the Naval Computing Machine Laboratory 
(NCML); it was located on the grounds of National Cash Register in Dayton, Ohio, the 
prime production contractor. 2 



HANDLE VIA TALENT KEYHOLE COMIWT CONTROL 3Y3TEM3 JOINTLY 
NOT ffiffT ff ft SABLE TO FOREIGN NATIONALS 



195 




DOCID: 3188691 




The American Navy Bombe 
A Navy WAVE checks rotor settings during World War n. 

Although a very fast comparator, the bombe was not a true computer. It did not have a 
stored digital program which could be modified. But even as the Navy designed and built 
the bombes, the British were moving ahead into the era of true computers. To attack 
systems even more complex than ENIGMA, GCCS was developing a computer which 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 3V3TEM3 JOINTLY 
NOT R E LEASABLE TO FOREIGN NATIONALS 




DOCID: 3188691 




employed an electronically generated key that was compared with the German cipher text. 
Although it did not have a true internally stored program, the settings were operator- 
adjustable according to how close he or she thought they were to a cryptanalytic solution. 
They called it Colossus. Some contend that it was the world's first true computer, although 
Colossus must compete for that honor with ENIAC, which was being developed at the 
University of Pennsylvania's Moore School of Electronics to generate complex artillery 
ballistics tables for the Army. Either Colossus, designed for cryptologic use, or ENIAC, for 
ballistics, probably deserves the title of the world's first computer. 3 

Postwar Developments 

OP-20-G could see the technological possibilities in the bombe, and it was decided even 
before the war ended that the effort should continue. But National Cash Register had no 
intention of continuing the association. They wanted to return to making cash registers. 
So at the end of the war, NCML was physically evicted, along with the remainder of its 
undelivered bombes, and the project came to a halt. 4 

OP-20-G needed a prime 
contractor with which to work. Months 
before the war ended, Howard 
Engstrom, a key figure on the bombe 
project, decided to start a new company 
specifically to do business with OP-20- 
G. At war's end, he left the Navy and 
took with him the best and brightest 
technicians at NCML. They set up a 
new company called Electronic 
Research Associates (ERA), under the 
wing of an already established firm 
called Northwestern Aeronautical 
Corporation in St. Paul, Minnesota. 
The Navy made no specific promises 
regarding contracts for the fledgling 
company, but none were needed. 
Engstrom and associates had a corner 
on the technological expertise that OP- 
20-G required, and contracts flowed 
almost immediately. 5 



HANDLE VIA TALENT KEYHOLE OOMINT CONTROL SYSTEMS JOINTLY 





Howard Engstrom 



DOCID: 



3188691 



•(b) (3J-P.L. B6-36 



The relationship between ERA and the Navy was emblematic of the way relationships 
had developed between the cryptologists and private industry. During thje war OP-20-G 
had developed a close relationship with IBM, Eastman Kodak, and Rational Cash 
Register. SIS had a similar kind of relationship with Bell Laboratories and Teletype 
Corporation. Those businesses kept a stable of cleared people who could do jobs quickly 
and quietly for the cryptologists. In the COMINT and COMSEC businesses, it did not pay to 
advertise. 6 / 

Both the bombe and ENIAC had been developed through classified wartime military 
contracts. Thus computing in the United States began in the rarified atmosphere of tight 
security. Though the cryptanalytic aspects were not publicized, the Army relationship 
with the Moore School became a matter of public knowledge in 1946 when the inventors of 
ENIAC, John Mauchly and J. Presper Eckert, gave a series of/lectures on electronic 
computers. As the two men left the Moore School to establish a computer manufacturing 
company, they dispersed their knowledge nationwide in what became known as the Moore 
School Lectures. Many felt that this lecture series launched the ; computer industry in the 
United States. 7 

Howard Engstrom had found out about the Moore School/Lectures, and he suggested 
that the Navy send a cryptologist to observe. Thus, when the/lectures began, sitting in the 
back of the room was Lieutenant Commander James T. Pendergrass, a Navy 
mathematician employed at Nebraska Avenue. Pendergpass delivered a report to the 
Navy on the Moore lectures which focused attention on/ the emerging new computer 
technology. This resulted in negotiations with ERA which led to the construction of the 
Atlas machine. 8 

Like the bombe before it, the first generation of postwar cryptologic computers 
produced highly specialized machines, called in thos6 days "rapid analytic machines" 
(RAMs). Each machine was constructed for a different purpose and attacked a different 
cryptanalytic machine or problem. Programs were /particular rather than general, and 
inputs and outputs were of specialized design. A listfof AFSA machines, both present and 
projected, in 1952 contained sixty RAMs, as opposed to only eight that had more flexible 
objectives. 9 An e xample of a RAM was ivhich was developed by ERA to attack 



LO 



Even in those early days computer companies were willing to take on difficult 
developmental tasks. For instahce^operating under a 1947 contract, ERA developed the 
world's first magnetic drum storage system.as part of a RAM project called GOLDBERG. 11 A 
successor project, called ATLAS (also built by EISA), applied the drum storage technology to 
a more general purpose cryptanalytic processor. ATLAS was ERA's first major computer 
development, and it led to the company's first commercial product, the ERA 1101, 
produced after the company had become merged with Remington-Rand-Uniyac to form the 
first major American computer company. 12 



(b) (1) 
(b) (3)-50 USC 403 
(b) (3) -18 USC 198 
(b) (3J-P.1. 8S-36 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 3YSTEMS JOINTLY 
NOT KFI EASAOLE TO rORBIOH NATIONALS — 



198 



DOCID: 3188691 




Atlas I 



While NSG forged ahead, ASA was trying to catch up. In ASA, the role played by 
Engstrom, Tordella, and Pendergrass was at first taken on single-handedly by Samuel 
Snyder, one of Friedman's most talented prewar cryptanalysts. 

Snyder's 1947 paper "Proposed Long-Range Cryptanalytic Machines Program for 
Literal Systems" played a seminal role in ASA's first postwar venture into the new 
technology. In it, Snyder proposed that ASA develop its own analytic computer based on 
extensive research into existing technology. Snyder himself did most of this early 
research, drawing at first on information provided by Pendergrass and Howard 
Campaigne of NSG. He made pilgrimages to the fountainheads of computer research: 
Aberdeen Proving Grounds to see ENIAC, Bell Labs to see its Relay Computer, IBM to see 



HANDLE VIA TALEtiT KEYHOLE COMINT CONTROL 3YBTEM3 JOINTLY 
TifiT W Fl ff AiSABLE TO FOREIGN NATIONALS 




DOCID: 3188691 




the IBM Selective Sequence Calculator, and MIT to see its Differential Analyzer. He 
attended a lecture series at the National Bureau of Standards (NBS) which concentrated 
on Univac products (Univac had been formed in 1946 by Mauchly and Eckert), Raytheon 
computers, and the Ace Computer (one of the earliest British entries into the commercial 
computer field). Snyder suggested that ASA team up with NBS, which already had some 
expertise in the field, and he proposed that ASA form a committee to guide the effort. 13 

ASA decided to go ahead with development of a general-purpose analytic computer 
called ABNER. Working through NBS, ASA arranged for subcontracts on mercury delay 
memory and for magnetic tape drives from Technitrol and Raytheon, respectively. Snyder 
contended that abner i, which was released for use in 1952, was the first machine that 
placed primary emphasis on nonarithmetic operations. Although it played a role in the 
development of later computers for cryptologic applications, one expert in in the field 
called Abner "barely functional." This was an appellation that could have applied to many 
of the early experiments in machine-age cryptology. 1 * 

The early cryptologic computers were troglodytic. They were physically programmed 
in binary instructions input via paper tape. They used octal numbers and words twenty- 
four bits long. There was no "computer language" as such. Memories were tiny by today's 
standards - the drum memory for ATLAS, for instance, held only 16,000 words. There being 
no more advanced technology available, vacuum tubes were used for relays, despite the 
obvious disadvantages this created in terms of heat buildup and tube replacement. Early 
computers were usually "down" more often than they were "up." When they were "up," 
though, they provided answers faster than anything imaginable. 15 

Vacuum tubes were on the way out, to be replaced by transistors, developed at Bell 
Labs in the 1940s by future Nobel prizewinner William Shockley and others. NSA 
scientists were among the first to apply the new transistor technology to computers, and in 
the mid-1950s it developed an in-house computer called SOLO, the world's first computer to 
be entirely transistorized. SOLO was subsequently marketed commercially by the 
contractor, Philco, as the Transac S-1000. 16 

Other innovations were on the way. In the mid-1950s NSA began making the 
transition from centralized computer operations to remote job access systems. The first 
remote job access computer, ROGUE (for Remotely Operated General Use Equipment), used 
hardware called Alwac HIE developed by a small firm called Logistics Research, 
Incorporated. ROGUE had three remote terminals connected to a small central processor. 17 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL BYSTEM3 JOINTLY 

NOT PffT.E'.AKA RT B- TO gnPffTPM T>T li tnmiAVn ... 




200 



DOCID: 3188691 




SOLO 



RAMs like ROGUE were good for specific jobs, but cryptologists recognized very early 
that they would require more generalized systems to process very large volumes of data. A. 
study in the mid-1950s depicted just how much material must be massaged. Raw traffic 
arrived in courier shipments every day at the rate of thirty-seven tons per month. An 
additional thirty million groups of traffic arrived (in Tecsumized form) via teletype. 
Traffic from some entities (particularly the mechanization-resistant manual Morse 
intercept) received less than 50 percent detailed processing - the rest was held in case it 
was needed. 18 

As early as 1946, NSG began the search for a computer that could hold very large 
volumes of data. Studies of mass data handling methods led to a contract between the 
Navy and Raytheon in 1951 to develop and produce a machine called NOMAD that would be 
physically and financially the largest cryptologic machine yet. But the NOMAD contract 
went badly off schedule from the first, and the contract was killed in June 1954. 19 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 9Y3TEM0 JOINTLY 
TgnTRF.T.r.^ cjfl m ff T" rinr^TTT ' mTn,,T 



201 TQE-SKRET U MSRA 



DOCID: 3188691 



The best general-purpose computer in the early days was an IBM product, the 701, 
designed in partnership with NSA. NSA leaned toward magnetic tape rather than disks, 
and the 701 had the first truly functional tape drives controlled by vacuum columns. 

The 701 was followed by the IBM 705, which became the mainstay for general-purpose 
computing. Coming on line in the mid-1950s, the 705 was a nonfixed-word-length 
machine. It had the best sorter around, an assembler (called a "transembler") that 
mimicked punched card machines. The 705 had a major impact on data processing, and it 
made it possible to begin processing massive volumes of data rolling in from the rapidly 
expanding network of collection sites around the world. 20 

Parallel to the general-purpose processors was a line of special-purpose scientific 
machines. Notable was the IBM 704, which had a 36-bit word, punched card input, and 
tape drives for storage. 21 

Cryptology still needed a general-purpose system. A committee, formed to review the 
demise of NOMAD, specified the requirement for a system that could be of use to both traffic 
analysts and cryptanalysts. For the traffic analyst, it would have to have large storage, 
have a file capability for collateral infor mation, and be capable of sorting quickly. For the 
cryptanalyst, it should be able to tackle 



To achieve the requisite flexibility, the system would require a general-purpose/ 
mainframe with special-purpose peripherals. The project was called FARMER. 22 

At the time, IBM was working on a project to extend the performance of its latest 
product, the 704, by a factor of 100. They called it STRETCH. IBM approached both NSA 
and the Atomic Energy Commission (AEC), the two government agencies that it felt would 
have the most use for such a system. AEC agreed to proceed, but NSA ultimately decided 
that it wanted something specifically optimized for cryptologic applications. However, 
IBM was on the right track, NSA concluded, and awarded Big Blue contracts for research 
in high-speed memory (SILO) and to design a general processing system for Agency use 
(PLANTATION, later called RANCHO). 23 The entire project was eventually folded int|o a 
gigantic effort to develop a large-scale computer. It was called HARVEST. / 

The most difficult part of the project turned out to be designing the magnetic /tape 
drives. Under a project called TRACTOR, IBM developed new tape drives and a uiiique 
automatic cartridge loading system having 100 times the speed of the IBM Type 727 tape 
drives then in use. Each of the three TRACTOR units managed two tape drives, and it 
automatically retrieved and hung data tapes in a robotic environment that was the fonder 

f 

of the U.S. government. It made for great theater and was on the mandatory show-ahd-tell 
tour for years. / 



(b) (1) 
' (b) (3J-P.L. 66-36 
(b) (3)-50 USC 403 
(b) (3) -18 USC 798 



HANDLE VIA TALENT KEYHOLE OOMINT CONTROL OYOTEM0 JOINTLY 




DOCID: 3188691 



IOP-secKEfuyetfA 




HARVEST tractor units 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 3Y3TEMS JOINTLY 
NOT ItELEACADLG TO FOREIGN NA T IONALS ' 




DOCID: 



3188691 

JOMBCltffUMWA 



HARVEST worked after a fashion and remained the Agency's central processor from the 
time it went on line in 1962 until it was finally retired in 1976, a phenomenal life span for 
any computer system. But those who had to make it work remember it as balky, difficult 
to program, and not performing anywhere near the specifications that had been set for the 
system. It was a transitional machine. 24 

NSA's most lasting contribution to computer history was undoubtedly Project 
LIGH TNING. LIGHTNING re sulted from NSA's reaction to outside criticism that it could not 

break systems and to proposals that this part of COMINT be transferred 

to an o utside research organization. Pricked by the criticism, Canine initiated an all-out 
attack 



/ As part of the project, Canine proposed that NSA develop a 



computer that would advance the state of technology by three orders of magnitude. He! 
decreed that the goal was a "l,o6o megaHertz machine," and at a USCIB meeting in! 
August of 1956 he requested $25 million seed money. The sum angered the Defense 1 
Department and placed NSA's budget in jeopardy. In order to get it approved, General 
Samford took his case directly to President Eisenhower and his top scientists, Vannevar 
Bush and Jerome Wiesner. Eisenhower came down hard in favor, and he authorized thk 
use of his name to push the project ahead. 25 

Three major contractors participated - IBM, RCA, and Sperry Rand Univac - but Ohio 
State University, Kansas University, Philco, and MIT also performed lesser rolek 
lightning never resulted in a computer, but the research teams turned up information 
that drove the next generation of commercial machines. Among the most significant 
findings were in the field of cryogenics. IBM's Dudley Buck developed the cryotron, , and 
through his research IBM proved the now-obvious axiom that the lower the temperature, 
the faster the computer. Sperry Rand Univac concentrated oh thin magnetic field devices 
and, through these early experiments in chip technology, found that computer speed woijild 
increase when components were subminiaturized in order to place them closer together. 
RCA concentrated on applications of the tunnel diode, one of the fastest switching devices 
known. 26 j 

As the 1950s wore on, cryptologists broadened computer applications to include! far 
more than just cryptanalysis. NSA first used computers to generate COMSEC material in 
1959, when the COMSEC organization began employing the Univac File Computer for that 
purpose. And for the processing of intercepted traffic for traffic analytic applications^ the 
IBM 700-series computers continued to be the mainstay. I 



(b) (1) 

(b) (3) -50 USC 403 
(b) (3) -18 USC 798 
(b) (31-P.L. 86-36 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SYSTEMS JOINTLY 
NOT ftffl T KASADLE TO FORDICN NAUlWALib 




204 



DOCID: 



3188691 



JOMKRETUBrfBRA 



| For scanning in the field, 

CDC (Control Data Corporation, the successor to ERA) developed the concept of key word 
search under a project called FADE-IN. Text scanning in the field was not implemented 
until the early 1960s. SOAPFLAKES was believed to be the first key word scan system at 
NSA. 27 

Most of these processes were off-line. Intercepted traffic in Tecsumized or diarized 
form spilled off the communications lines in paper tape form and was carted off to another 
area of the building to be input to processing computers. But it was not the wave of the 
future. SMAC first began experimenting with the use of a computer to directly receive 
inputted messages from the field, and so avoid the paper tape step. This effort used Univac 
494s and was in a very early stage of development as the 1950s came to a close.. 28 



NSA COMMUNICATIONS IN THE PRE-CRITICOMM ERA 

S (3) -so use 403 Equipment is obsolescent, insufficient in number and inadequate for the purpose. . . . Such 

(b) (3)-p.l. 86-35 essentials to operations as, for example, a place to put live traffic and operators' logs, are 

neglected in the installation and are provided, if at all, as an afterthought when operations 
begin. . . . Homemade bins in the aisles, traffic piled on the floor or clipped to overhead wires like 
clothes on a line, logsheets resting on machines, et cetera, are the inevitable result. 

1955 study of the COM1NT communications system 



Rapid communications is the lifeblood of SIGINT. Cryptologists have grown so 
accustomed to virtually instantaneous access to remote corners of the globe that they could 
not operate any other way. But in the early days, they operated in a decidedly different 
mode. 

AFSA, when created, had no indigenous communications at all. Instead, the 
organization depended entirely on communications paths and facilities provided by the 
services. COMINT passed from collection sites to Washington on armed service 
communications. It was encrypted off-line at the field site, then was passed to a local 
communications center manned by non-SI indoctrinated people, who put it on common 
user circuits for transmission. If the traffic originated at a Navy site, it was put onto naval 
communications; if it was an Army site, it went via Army communications; and so forth. 
The traffic was long, vertical umbilical, service-unique and electrically sealed until it 
reached Washington, where the information could then be passed to other services or to 
AFSA. 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SYSTEMS JOINTLY 
N nTPgiRAg*PTWTnrnnrTrMiTimTrm>iT« 




DOCID: 3188691 

IQMkrEtijMbra 



The message went via HF single sideband, passing through up to six relay centers 
before finally arriving at either Arlington Hall or Naval Security Station. It might have to 
be reencrypted up to five times, and the process required from twenty-four to forty-eight 
hours to send a routine message to the capital. Because of the many relays and inherent 
degradation of HF channels, up to 30 percent arrived undecipherable and had to be 
retransmitted. Messages required several hours for decryption, and the handling time for 
each message, including marking and routing to the intended recipient, took several more 
hours. The ASA communications center at Arlington Hall, for instance, was taking 
approximately four days (on top of the one to two days of transmission time) to deliver a 
routine message. The fastest possible handling time on the most critical information was 
not less than five to six hours from time of intercept, according to information furnished to 
the Robertson Committee in 1953 . 29 

When AFSA came into existence, 
the communications system on which it 
relied was reported to be "in a 
deplorable and deteriorating state." 
Arthur Enderlin, one of AFSA's top 
communications people, conducted a 
study detailing the decrepit conditions 
and sent it to Admiral Stone. A 
disbelieving Stone decreed a full-blown 
study, which just confirmed Enderlin's 
contentions. 30 

Nothing was done under Stone. But 
when Canine arrived, plans were 
immediately laid by Enderlin's 
successor, Lieutenant Colonel William 
B. Campbell, for a separate AFSA 
communications center to process traffic 
destined for AFSA organizations. In 
July 1952, the new communications 
handling facility opened in B Building 
at Arlington Hall, using Teletype Corpo- 
ration Model- 1 9s. This was a good first 
step, and it reduced the message 
handling time for routine messages to 
three hours, while cutting the message 
backlog to almost nothing. 31 




Arthur Enderlin 
One of NSA's communications pioneers, he helped 
develop the system throughout the 1950s and 1960s. 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SYSTEMS JOINTLY 




DOCID: 3188691 



IO^eCRefUJ^ffiRA 

Another Canine push was for secure telephone communications. The NSA gray phone 
system, formally known as NSA/CSS Secure Telephone System (NSTS), began in AFSA's 
waning days with a total of 200 lines, 100 each for Nebraska Avenue and Arlington Hall. 
AFSA took possession of two-thirds of the telephone instruments, while the collocated 
SCAs got one-third. A month later (September) a new microwave system became 
operational between the two locations, ushering in an era of high-reliability, high-fidelity 
communications. At the time, the system required an operator to connect the two parties, 
just like commercial telephone circuits of the era. The following April NSA issued its first 
consolidated telephone directory. 32 

AFSA began broadening its secure communications contacts with its customers. The 
Zone of Interior Connectivity (ZICON) net, originated in the early 1950s, consisted of 
landline communications paths between AFSA and its principal customers: the three 
services, State, and CIA. Later, the National Intelligence Indications Center in the 
Pentagon was added, as well as SAC and CONAD (Strategic Air Command and 
Continental Air Defense Command) for the Air Force. 33 



The comint Comnet 

By 1952 it was already clear that the growing volume of cryptologic communications 
would not permit newly established NSA to pursue the old way of doing business. Already, 
the daily group count was considerable and would grow in the ensuing years, as the 
following table shows. 

Table 1 

Total Mean Daily Average Group 
Count at NSA 3 * 



Year 


Count 


1952 


648,000 


1953 


1,247,117 


1954 


1,322,552 


1955 


1,320,073 


1956 


1,227,158 


1957 


1,424,351 


1958 


1,729,430 


1959 


2,059,763 


1960 


2,615,377 


1961 


3,896,211 


1962 


4,306,910 


1963 


5,089,777 


1964 


6,134,601 



HANDLE VIA TALENT KEYHOLE OOMINT OONTIIOL DYOTBMQ JOINTLY 
NOT RRT ft P' p ™ ivwiPTmi n Lmnvr * t e- 



207 




DOCID: 3188691 



(b) (1) 

(b) (3) -50 USC 403 
(b) (3)-18 USC 79B 
(b) (31-P.L. B6-36 



jrw^secRFTu^eRA 

Spurred by the studies by Enderlin and Campbell, and by the insistency of Canine, 
NSA devised a plan to establish a worldwide cryptologic communications system. 
Initially, NSA would establish a network of dedicated channels on th\e service 
communications systems, manned only by Si-cleared people to eliminate the\multiple 
encryption-decryption exercises. 

But the ultimate plan was to establish a separate system, called the COMINT Comnet. 
The dedicated circuits would gradually be internetted into a series of relay stations, 
manned only by Si-cleared people. Initially there were to be six of these relay ce nter's, but 
the number would expand along with the system of field sites that they serviced, 



| Intercept sites would feed into the relay centers, which would bulk-forward traffic 

(primarily intercepted material) back to NSA. 

The relay centers would operate initially using torn-tape relays, but would eventually 
transition to automated relay systems, thus significantly reducing handling time. Once in 
the system, a message would never have to be reencrypted. When it reached NSA, it would 
be distributed internally using facsimile equipment. In 1953 Canine announced to a field 
site commanders' conference that the ultimate objective was to be able to return priority 
traffic through the communications system within five to ten minutes, while routine 
traffic would flow through in no more than an hour. 35 

Canine was able to obtain, in short order, direct communications circuits to Stateside 
users, GCHQ and CBNRC (as the Canadian cryptologic organization was then called). By 
the end of 1952 NSA had nine such circuits and plans for six more in the near future. 
These on-line circuits formed the basis for the COMiNTComnet. 36 

But the rest of the plan depended on service cooperation, and that was a different 
matter. Planning for the COMINT Comnet was entrusted to the Joint Communications 
Electronics Committee, a joint JCS-level planning body whose chairman, Admiral John 
Redman, had been a prominent member of the Navy cryptologic team during World War 
II. But Redman was also a dedicated Navy man, and he viewed the proposed Comnet as 
cutting down on the channel capacity available for other, uniquely service, uses. Under 
such auspices the plan for a Comnet did not have a bright future. 

A steering committee called CENSA (Communications-Electronics - National 
Security Agency) decreed that each service would fund its own portion of the Comnet. And 
there was where the rocks were. The services had other funding priorities, and moneys 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL QYOTEMQ JOINTLY 
NTOTRF.r.R/ iTimfi'Tnn III II 'M I lii I l"f I 'il r 




208 



DOCID: 3188691 



never seemed to be available for the Comnet. Every year NSA communications planners 
enthusiastically charged up the hill, only to be beaten back again. 87 

By the mid-1950s, the system was only partially funded, and so far no one had agreed 
on an automated switch for the new relay centers. The centers that existed were entirely 
manual operations, in which traffic from an incoming circuit generated a perforated tape 
on the Mod-19. When the reperforator finished chattering, a communications center 
operator coiled up the tape and carried it across the room to an outgoing circuit for onward 
relay to the next center. Coiled tapes sat in boxes behind teletypewriters, awaiting 
transmission. Communication centers were chaotic, operators were overworked, and 
twelve-hour shifts were standard. 

Meanwhile, NSA did what it could to improve the operation. The greatest technical 
innovation of the 1950s was the introduction of the B urroughs-produced KW-26 on-line 
encryption device. The KW-26 was a marvel of its day 

almost doubled transmission speed. 

Serial #1 of the KW-26 was placed in operation at the new NSA communications center at 
Port Meade in 1957. The last of these devices was not pulled off the line until 1988. In the 
ensuing thirty-one years it became the mainstay of cryptologic communications around 
the world, the most secure and reliable on-line encryption device the United States had 
ever fielded. 38 

The new communications center at Fort Meade was planned to overcome the inherited 
inadequacies of the facilities at Arlington Hall and Nebraska Avenue. Canine had wanted 
NSA Fort Meade to start life with KW-26s, but the acquisition plan ran behind schedule, 
and the new communications center on the 2-E corridor began with a hodge-podge of 
equipment. 

But on one thing Canine was insistent - he would not move to Fort Meade without a 
secure ("gray") phone system. The secure phone system had expanded rapidly, and by 
1956 it linked NSA with most important Washington-area customers. In 1957 work began 
on the microwave tower on Fort Meade that was needed to carry the gray phone system to 
Washington. The Chesapeake and Potomac Telephone Company provided the path, while 
Motorola provided the radio equipment for the link. Although Canine never actually 
moved to Fort Meade (he retired with his office still at Arlington Hall), his successor, 
General Samford, had a gray phone on his desk, courtesy of his predecessor. 39 

Meanwhile, the early flirtation with facsimile equipment for internal distribution had 
turned out badly. Fax, as it was called, could not handle the mountainous volumes of 
traffic flooding into NSA every day. So in 1954 the Agency decided on distributed 
teletypes. Teletype Corporation equipment was ordered, and equipments were parcelled 
out through the Production working spaces. A new communications router would be 
assigned to all incoming traffic. It would be called the DDI (Delivery Distribution 
Indicator) and would have a very long and prosperous life. 40 




(b) (1) 

(b) (3)-P.L. 86-36 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 5Y3TEM3 JOINTLY 



209 TXlP-S€Cl?lTUrymRA 



DOCID: 3188691 



jXJMecREfujytWA 

In the fall of 1957, Sputnik went up, and the White House wanted all military and 
warning communications systems brought up to par. At the time, the COMINT Comnet was 
still in a state of partial being. NSA had managed to purloin some dedicated channels, and 
the cryptologic community operated a few relay centers around the world. But the system 
needed to be consolidated. More, it needed updated equipment, especially automated 
relays to get rid of torn tape relay arrangements. Moneys for these improvements had 
managed to find their way into military budgets throughout the 1950s, but they always 
seemed to disappear into the outyears as the services took care of more pressing 
requirements. All involved had grown cynical, and the budget for FY59 was not even 
covered with the fig leaf of outyear moneys. . It contained nothing at all for the COMINT 
Comnet, and this was how the Eisenhower administration found it in early 1958. 41 

SECURING AMERICAN COMMUNICATIONS 

It became apparent to me early in my work in the Signal Intelligence Service that it was more 

important to secure our own messages than to read the communications of others I think it is 

imperative that our history show the importance of our communications security effort as 
compared with intelligence production. 

Frank B. Rowlett 

The COMINT Comnet would be no good if it were not secure. The business of securing 
American communications had always been integrated with the task of breaking the 
communications of other countries. Thus from the earliest days the cryptologic coin had 
two sides: COMINT and COMSEC. During World War II, Signal Intelligence Service had a 
COMSEC arm, and it produced COMSEC equipment and materials for the Army around the 
world. In the Navy the integration was more tenuous and the COMSEC mission more 
diffuse, but closely allied offices of OP-20 were involved in both functions. When the Air 
Force was created, it gave COMSEC responsibilities to USAFSS. Thus the uniquely 
complementary aspects of COMINT and COMSEC were recognized from the first. They were 
never, as they were in Germany, divided among various organizations. Although the two 
were, as World War II naval cryptologist Joseph Eachus once said, "natural enemies," the 
dependence of one on the other was firmly established. 

The Era of the Wired Rotor 

Since the Revolutionary War, the U.S. government had been using manual (mostly 
paper-based) code systems for communications security. With the advent of radio in the 
early part of the twentieth century, communications security became even more 
important. At the time, only manual codes and ciphers were available. Encrypting and 
decrypting was a laborious process which slowed down communications and limited the 
amount of information that could be sent from place to place. 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SYSTEMS JOINTLY 
NOTR,RT, ff |*| c { fl T'T FT'" > r""frTriTnTHr i ' l 1 1 ll nl 'i 



211 




DOCID: 3188691 




Paper codes were archaic solutions to modern communications requirements. After 
World War I, inventors around the world worked on the problem, and almost 
simultaneously three or four of them came up with the same solution - a mechanical 
device consisting of rotors which moved to a different position each time a letter was 
depressed on a keyboard. In the United States, the inventor of the hour was an eccentric 
Californian named Edward Hebern. Hebern tried to sell his device to the Army and Navy, 
but they found it to be both inherently insecure and mechanically unsound. Because of 
this and patent and contractual difficulties, the relationship with Hebern was 
terminated. 42 

This did not mean, however, that the services ceased work on rotor machines. 
Paralleling their competitors in the other industrialized nations, they made the wired 
rotor the basis for most COMSEC devices used during World War II. The most secure 
machine in the war, the SIGABA, was a wired rotor machine designed more or less jointly by 
the Army and Navy in the late 1930s. The SIGABA was large, heavy, and required a good 
deal of electricity. Some 11,000 were produced during the war. To communicate with the 
British, SIS devised a modified SIGABA called the CCM (Combined Cipher Machine), and 
the British used a very similar device on their end called Typex. CCM continued in use 
long after the end of the war and was not replaced until 1958, when the KL-7 was 
introduced for NATO use.* 3 




SIGABA 



HANDLE VIA TALEITO KEYHOLE COMINT CONTROL OYSTEMO JOINTLY 




212 



DOCID: 3188691 




For tactical use, the Army used a modified Hagelin machine called M-209. It was 
small and light, and being completely mechanical, it required no electricity, which made it 
ideal for foxhole use. But it was difficult and time-consuming to set up properly. 
(Nonetheless, it continued in use into the early 1960s.) Smith-Corona produced it in huge 
quantities for $64 a copy - one former NSA official estimated that some 125,000 devices 
were built before it went out of production. 44 

The wartime machines were, with two exceptions, off-line devices. One typed the plain 
text of the message on a keyboard, and the machine produced cipher text on (usually) a 
sticky-backed tape which could be glued on a paper and taken to the communications 
operator for transmission. 

To handle the increasing volumes of messages, what was needed was a machine that 
could convert plain to cipher text on-line. SIS devised a solution early in the war. Called 
SIGCUM (Converter M228), it was not as secure cryptographically as SIGABA, and a new key 
setting was required for every message. As a result SIGCUM was used in only limited 
numbers. 45 

A different sort of on-line machine was the SIGTOT, which used a one-time tape. One- 
time tape machines became known generically as Python systems because of the huge coils 
of cipher tape that they required. Python systems were used until the early 1960s, but 
they were cumbersome because of the enormous quantities of tape that had to be 
generated, handled, and fed through the TD (transmitter-distributor). They were not the 
long-term answer. 46 




SIGTOT 

(Note the paper tape threaded from the right-hand 
spool across the center of the machine through a perforator.) 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL QYQTEMO JOINTLY 



213 




DOCID: 3188691 




The Early Years of Secure Speech 

Voice was far more difficult to secure. Systems devised in the early days of World War 
II were cryptographically vulnerable, and better security was needed. Bell Labs built a 
more sophisticated system during the war to carry high-level transatlantic phone calls. 
Called SIGSALY, it was a true archetype. SIGSALY consisted of forty-five racks of equipment, 
weighed thirty tons, occupied an entire room, required thirteen technicians to operate, 
sucked up 35 kilowatts of power, carried only one voice channel, and cost $1 million per 
copy. But given the cryptanalytic sophistication at the time, it was secure. At that price, 
the government ordered only twelve systems and installed them in the key capitals of the 
Western world, including Washington, London, and Melbourne. Churchill used it a few 
times, and, apocryphally, Roosevelt also tried it out once. He allegedly gave up on it, 
unhappy with the speech quality. 47 The United States entered the postwar era needing a 
much smaller and less costly secure voice system. 




SIGSALY 



HANDLE VIA TALEIfT KEYHOLE CO MINT CONTROL 0Y3TEM3 JOINTLY 
NOTREI, FAgAmiTTr>i?nT>TrTr'T>TiT i mTn»T . in 




214 



DOCID: 3188691 



TOMecRTruyfBRA 



Organizing for COMSEC in the Postwar World 



The SCAs slipped into the postwar period with their COMSEC authorities virtually 
unchanged. The newly renamed ASA was responsible for all Army COMSEC tasks. COMSEC 
functions were part of the same organization, and personnel rotated between COMINT and 
COMSECjobs. 

The Navy COMSEC functions were still less monolithic than those of the Army, and the 
tasks of engineering development, COMSEC research, production of keying material, and 
building COMSEC machines were spread out across several organizations. COMSEC 
functions involved the Bureau of Ships, Deputy Chief of Naval Communications for 
Administration, Deputy Chief of Naval Communications Supplementary Activities (CSA, 
i.e., NSG), and the Naval Code and Signal Laboratory. It was a complex bureaucracy, but 
the link-up with the COMINT and COMSEC organizations within CSA seemed to keep naval 
COMSEC moving in the same direction. 48 

The newly created Air Force did not at first have a centralized COMSEC organization, 
and for the first year or two of its existence it was serviced by ASA. But when USAFSS 
was created in 1948, the Air Force assigned its centralized COMSEC functions to the new 
cryptologic organization. 

The three service efforts were rather loosely coordinated by the Joint 
Communications-Electronics Committee. When one service developed and procured a 
COMSEC device with broad applicability, it took care of the requirements of the other 
services, a seat-of-the-pants approach to centralization which worked as long as everyone 
agreed on the program. 49 So when AFSA was created in 1949, all three SCAs were doing 
their own COMSEC. 

Almost unnoticed at its creation, AFSA was anointed with centralized COMSEC 
responsibilities. Naval Security Station at Nebraska Avenue became the locus for COMSEC 
activities. Army colonel Samuel P. Collins and civilian Abraham Sinkov headed AFSA's 
COMSEC organization. Centralized COMSEC functions were placid by comparison with 
COMINT, and contributed little if anything to the demise of the organization. When AFSA 
collapsed, it was because of turmoil in COMINT, not COMSEC. 50 

When in October 1952 President Harry Truman established NSA, he also signed a 
memorandum creating a centralized COMSEC function. The memo declared that COMSEC 
(like COMINT) was a national responsibility, and it set up the secretary of defense and the 
secretary of state as a special committee of the National Security Council for COMSEC. It 
also directed that a new central board be established, to be called the United States 
Communications Security Board (USCSB) to serve as an interdepartmental source of 
COMSEC policy. 



HANDLE VIA TALENT KEYHOLE COMINT CONTROK3TSTEM3 JOINTLY 
, NOTRE! . EASimLE TO FOIIKKJW HIAUUNALS 




DOCID: 3188691 




But his memo did not actually establish the board, and a year dragged by before 
USCSB received a charter. In the interim, Ralph Canine moved into the breach and acted 
as the central COMSEC authority for the United States. The COMSEC function at Nebraska 
Avenue continued as before while NSA waited for an official COMSEC structure to be set in 
place. 51 

The long delay in establishing an official COMSEC charter, NSC 168, was due to 
disagreements over wording and authorities for NSA. Canine objected to the lack of 
specific centralized authorities for NSA, and to a provision which placed DIRNSA under 
the JCS for COMSEC. He was successful in getting the offending sentence removed and in 
strengthening his other authorities. In October 1953, NSC 168 was published, and USCSB 
was officially launched. 52 

Besides DIRNSA, USCSB comprised representatives from State, Defense, Treasury, 
FBI, the three services, CIA, AEC, and Justice. At the first meeting, the board began an 
unstated but unswerving policy of always electing the Defense representative as the 
chairman. This was normally the top scientific and technical official, and in the 1960s 
Harold Brown, Eugene Fubini, Finn Larsen, and Gardiner L. Tucker, all deputy 
secretaries of defense for research and engineering, successively chaired USCSB. 53 

NSC 168 did not give Canine the whip hand for COMSEC that NSCID 9 did for COMINT. 
The COMSEC process was very different, and it was never amenable to the rigid structure 
and centralized control that applied to COMINT. Centralized authority was couched in 
terms of cajolery rather than direction. NSA had specific technical authorities to prescribe 
cryptoprinciples and cryptosecurity rules. But organizational authorities such as budget, 
research and development, cryptosecurity monitoring, program review and the like were 
expressed in less authoritarian terms such as "develop," "plan," "prepare," "formulate," 
and "insure." The services retained much of their COMSEC functions and structure 
(generally resident within the SCAs). If a technical standard were violated, pulling the 
offender back into line was to be done through the parent service. NSA could not force a 
service to employ cryptosecurity on a given link; it could only point out the consequences of 
noncompliance. Canine did not have central budgetary authority over COMSEC, and he 
could not force a service to allocate money to COMSEC. 54 

However, if a service decided to encrypt communications, NSA ruled the technical 
specifications with an iron hand. It produced all the keys, wrote the procedures, governed 
all compromise reporting and evaluation, established key supercession requirements, and 
so forth. In this respect its COMSEC authority approximated its hold over COMINT. 55 

Unlike USCIB (later USIB), USCSB did not become a strong and vital organization. 
During the 1950s it held only a single meeting per year. In 1960 it met four times to solve 
the problem of release of crypto equipment to NATO (a difficult issue which is covered on 
the following page) and to deal with the problem of communications security (see p. 221). 
After that it did not meet again for eight years. It named only one standing committee, the 




DOCID: 3188691 



(b) (1) 

(b) (3)-18 USC 798 
(b) (3)-P.L. 86-35 
(b) (3) -50 USC 403 




!T UMBRA 



Special Committee on Compromising Emanations (SCOCE) - TEMPEST. NSA acted as its 
secretariat and effectively did all the Wk$\ 

Far more than just prescribing COjtfSEC policies, NSA became deeply involved in the 
design and production process. The AgencyXgenerated keying material using a wide 
variety of techniques. NSA also designed COMSEC machines and simply turned the 
production process over to a contractor after ah. the designs were completed. The 
contractor in those days was little mare thanXan assembly organization. All the 
interesting work was done in-house, 57 This would change in the 1980s under Walter 
Deeley's "New Way of Doing Businesk" 58 \ 

AFSAM-7 \ \ 



In the early 1950s AFSA, and late^ NSA, pushed aheac \ | to develop 

their first central, multise rvice encW otion device, the AFSAM-7, later the KL-7. 

rotor and the Navy only a rotor, Canine 

Erie Army's rotor as the standard. TheKL- 



Although the Army wanted a 
decreed uniformity, and NSA adopted t 
7 proved immensely popular, and some 20,000 were produced at the very reasonable cost of 
$1,200 a piece. Weighing only thirty pounds, it could run off either AC or DC power 
(including a jeep battery). 

The Navy strongly resisted the AFSAM-7/KL-7 development. After rejecting several 
modifications designed to satisfy their requirements, they adopted a modified device called 
a KL-47. The KL-47 was to have a long and interesting history . The Navv ended up using 
it extensively aboard ship. | 



When the AFSAM-7 was still new, the JCS proposed giving it to NATO countries. 
This got NSA into a very murky area. Defense and State had for year s been concerned 
about the security of U.S. defense information on NATO communications. 



Ib) (1) 

(b) (3) -50 USC 403 
(b) (3)-P.L. 86-36 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 3Y3TEM3 -JOINTLY 
wvr rki .w. * f ft pt it to r rm r . i n i « \ 1 1 n ■ i u u A lir 



217 




DOCID: 3188691 





AFSAM-7 



Several different systems, including Typex and M-209, were loaned foV NATO use, but 
none of them solved the problem of availability and security. Then in\ 1953 the JCS 
proposed the brand-new AFSAM-7, the best off-line system the UlS. had. \State and CIA 
both opposed the decision, but after several years of acrimonious\disagreement, USCIB 
approved the AFSAM-7 for transfer to NATO. NSA voted with the W ajorityl 



The Push for On-line Encipherment 



The conversion of record communications to on-line encipherment was probably the 
most significant COMSEC development of the postwar era. In the space of a few years NSA 
led the U.S. government into the era of secure circuitry. 



HANDLE VIA TALENT KEYHOLE COMINTCONTROL0Y3TEMQ JOINTLY 




218 



DOCID: 3188691 




After the war, thecryptologic community began the search for a reliable and efficient 
on-line device. For a time it appeared that one-time tapes were the answer. The British 
developed the 5UCO or the Secretape, which achieved limited use during the early 1950s. 
But tape production and handling were still a nightmare, and the volume of 
communications required in the 1950s dictated another solution. 60 

Circuit speeds were beginning to exceed the capability of mechanical rotors to keep up. 
What was needed was an electronic key generator. The solution was the NSA-developed 
KW-26, the first on-line electronic key generator to come into wide use in the United 
States. First fielded in 1957, the KW-26 remained the mainstay of U.S. enciphered text 
communications for thirty years. According to a former NSA COMSEC official, the KW-26 
made the Agency's COMSEC reputation. 81 

The KW-26, because it was electronic rather than electromechanical, had no moving 
parts, and its speed was limited only by the speed of the associated teletypewriters, which 
at that time was up to 100 words per minute. Built during the transition from tubes to 
transistors, the KW-26 had a little of both. It had a simple-to-set key system using cards 
manufactured at NSA. When an operator pulled the card out of the machine, a knife sliced 
it in half so that it could not be reused. Its chief disadvantage was that it could be used 
only for point-to-point circuits, which dictated that a huge number of machines be 
manufactured. At one time the NSA communications center alone had 336 of them. 62 

The point-to-point modus limited the KW-26's utility in the Navy. Naval 
communications were marked by wide-area fleet broadcasts to large numbers of ships 
afloat. Naval vessels needed the capability to tune into a broadcast at any time during the 
day or night and just receive traffic - transmitting messages was a much smaller 
communications function. To solve this problem, NSA designed the KW-37, a crypto 
device that permitted a ship's communications operator to tune into the fleet broadcast 
using a cryptographic catch-up function. 83 




KW-37 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SYSTEMS JOINTLY 
NOTRELF Ag/>|flT'!"rr>r'nPr?TnTiTnniiiiiU]ii ..«— 

219 TOBS£€RCfu^RA 



DOCID: 3188691 



••'(b) (1) 
(b) (3)-18 USC 798 
(b) (3J-P.L. 86-36 




The next on-line crypto device to be widely adopted was the KG-13^ Unlike the KW- 
26, it was a general-purpose key generator, which meant that it could be used for more 
than just teletypewriter security. Fully transistorized, it was smaller and lighter and was 
suitable for a wide variety of uses. It could encrypt voice and, with the HY-2 vocoder, 
became the backbone of the Autosevocomm voice encryption system in the 1960s. 6 * 

From SIGSALY to Modern Voice Encryption 

As soon as the war was over, the paleolithic SIGSALY was scrapped. Surely the U.S. 
could find something smaller, lighter and cheaper. In the late 1940s AFSA developed a 
voice encryption device called the AFSAY-816, which was used to encrypt the new secure 
voice system between Arlington Hall and Nebraska Avenue. Using a primitive vacuum 
tube key generation and pulse code modulation, it produced good voice quality. The 
drawback was that it needed a 50 KHz carrier. 

When computers came into general use in cryptology, NSA j udged that the AFSAY-816 
was cryptographica lly suspect and replaced it with the KY-11, | 

. |The KY-11, however, had the same drawbacks as the earlier AFSAY-816. 

It was a large system and was kept in the communications center. It sucked up huge 
swatches of bandwidth, making it appropriate for the microwave systems in the 
Washington area, but hardly anywhere else. 65 

Because it required communications center security, the KY-11 was not suitable for 
general executive level use in Washington. To remedy the problems of size, weight, and 
security protection, NSA developed the KY-1. It was packaged in a single cabinet about 
half as high as an ordinary safe and was secured with a three-position combination lock. It 
was distributed to very high-level users like the secretary of defense, secretary of state, 
DCI and others. It was the first voice security system installed in private residences, and 
one of the early models was placed in Eisenhower's farm in Gettysburg. 

To use it must have been mildly frustrating, as it was a half-duplex, push-to-talk 
system. Voice quality was high, but at a familiar cost - it required wideband voice 
circuitry. By the mid-1960s, it had been replaced by the KY-3. 68 

NSA's first entry in the narrowband sweepstakes was the KO-6, a multipurpose 
equipment which could encrypt speech signals as well as others. It could compress and 
digitize speech into a narrowband transmission system, but only at considerable cost. The 
KO-6 weighed a ton, required three kilowatts of power, and, according to one NSA expert, 
"provided almost intelligible narrowband secure voice." As a result, it was seldom used in 
the voice mode. 67 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SYOTEM0 JOINTLY 
TtfnT RRT . q ft o a °t p <rn pmrTfiv mmniTii a- 




DOCID: 3188691 



i(b) (1) 

|(b) (3)-P.L. 86-36 



TEMPEST 



During World War II, Bell Laboratories, under contract to develop various devices for 
the Signal Corps, was working on a one-time\ tape mixing device called, a 131-B2. 
Engineers in the lab noticed that every t ime the device stepped, a spike would appear on 
an oscilloscope in another part of the lab 



Bell Labs reported this to the Signal (Dorps, but the report attracted Tittle attention. So 
the Bell engineers mounted an int ercept effort, copying and reading plain text from the 
Army Signal Corps communications \ 



This time the Signal Corps tobk notice, and asked Bell Labs what could be done. The 
Bell engineers found that the problem; was caused by 



The resulting signal could emanate through the 
They suggested that the problem could be corrected 
by shielding the keying devices, by filtering the power lines, or by masking. They built a 
modified mixer using both shielding and filtering. But the Signal Corps refused to buy it 
because it virtually encapsulated the machine, making it difficult to work on and was 
subject to heat buildup. Instead , they sent ja message to the field urging commanders to 

their comnuinication centers to prevent hostile signal 



control 



monitoring 



68^ 



Germans. 



131 



The Germans knew about this probl 
plain text from close-in ranges. The USSR, 
very likely learned it from captured 
governments knew about it, too. Despite 
during the war. For all practical purposes 
1951, while working on the very same 
and AFSA set to work on the problem 
however, and while equipment was being d 
requiring that all COMINT activities control 
communications center. As an alternative, 
teleprinters chatter away simultaneously, 
masking. 69 



em and understood the potential for obtaining 
, jwhich was using the technique by the 1950s, 
There is evidence that other Allied 
;hisj, the Americans forgot what they had learned 
| it was rediscovered by a CIA technician in 

B2 mixers. CIA notified AFSA of its findings, 

i 

Designing cquntermeasures required time, 
'evgloped, AFSA issued instructions to the field 
a zone 200 feet in all directions of the 
, a commander could require that at least ten 
the idea being that this would introduce 



At this point, the newly established NSA decided to test all its equipment. The result - 
everything radiated. Whether it was mixer s, keying devices, crypto equipment, EAM 
machinery, or typewriters, it sent out a s ignal 

Plain text was being broadcast through the 



electromagnetic environment was full of it. 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SY3TEM3 JOINTLY 



221 




DOCID: 3188691 



••'(b) (1) 
(b) (3J-P.L. 86-36 



Thus was the TEMPEST industry spawned. NSA initiated a joint project with the SCAs, 
which in the early years discovered problems much more rapidly tha n it could design 
solutions. In 1955 the p roblem of electromagnetic emanations wa£ 
[Moreover, there Was hard evidence that in t 



lis one area the 

Soviets were far ahead of the U.S. technologically and that America's East Bloc embassies 
were all being penetrated. It was a Frankenstein House of Horrors. 70 . 

The first big breakthrough was by I^aval Research Labs, whichXredesigned the 
offending 131-B2 mixer and called it the IjlEL Mixer. NRL used a technique called low- 
level keying, in which the power was lowered to such an extent that a signal p reviously 



j The KW- 

26 contained this circuitry, as did every crypto device after that. As long as the 
communications center used the device at ihe suppressed keying mode rather than at full 
power (an unwarranted assumption), it was: reasonably well protected. 71 

By 1958 NSA was ready with the first generally applicable tempest standards, which 
were published under JCS authority. According to the new guidelines, Department of 
Defens e organizations could not use equipm ent that would radiate farther than the zone of 
control, NSA published NAG-1, a TEMPEST bible that 

established TEMPEST measurement techniques and standards. The new rules did not, 
however, say anything about when the guidelines had to be met, nor did JCS budget 
money to fix the problem. Funds had to come from the individual commands and had to 
compete with all other funding priorities. Recognizing that the problem was far from 
fixed, USCSB in 1960 established its first and only subcommittee, the Special Committee 
on Compromising Emanations. 72 But many years would pass before TEMPEST standards 
reached general acceptance. 

''(h) (3)-P.L. 86-36 

Notes 



1. NSA/CSS Archives, ACC 6851, CBKI 61. 

2. Colin B. Burke, "The Machine Age.Begins at OP-20-G: Or, Don't Do It This Way Again," presentation at the 
1992 Cryptologic History Synjposium, 28 October 1992. 



Jrfie Secret War," in CCH Series IV.V.7.18; Joel Shurkin, Engines of the Mind: A History of 



3. 

the. Computer (New York: W. W. Norton, 1984). 

4. SRH-267. 

5. Ibid. 

6. Samuel S. Snyder, "The Influence of U.S. Cryptologic Organizations on the Digital Computer Industry," SRH 
003. 

7. Ibid. 



HANDLE VIA TALENT KEYHOLE COMIKT CONTROL 3Y3TGM3 JOINTLY 
NOT RKT, P ; rt, S ft ?T F ™ ™^iy-vt iTimpirn. 




222 



DOCID: 3188691 



/(b) (3)-P.L. 86-36 




8. Ibid.; oral interview with Dr. Howard Campaigns, 29 June 1983, by Robert Farley, NSA OH-14-83. 

9. NSASAB, "Technology for Special Purpose Processors," March 1978, in ACC 2745 1 , CBUI 3 1; and ACC 10896, 
CBOC33. / 

10. Douglas Hogan, "General and Special Purpose Computers: A Historical Look and Some Lessons Learned," 23 
May 1986, unpublished manuscript in CCH files. 

1 1 . Snyder, CCH series VI.D.3.7. 

12. NSA/CSS Archives, ACC 10978, CBOC 33; ACC 6851, CBKI 61 ; ACC 10573, CBVB 57. 

13. NSA/CSS Archives, ACC 11112, CBJtl 55. 

14. Snyder ."Influences," NSA/CSS Archives, ACC 10978, CBOC 33; Phillips interview. 

15. Phillips interview. 

16. Snyder,"Influence"; NSASAB, "Technology. . . 

17. Snyder, "Influence." 

18. "Mechanization in Support of COMINT." 

19. NSA/CSS Archives ACC 10978, H01-0601; Douglas Hogan. 

20. Phillips interview. 

21. Ibid. 

22. Hogan, Snyder, "Influence." 

23. Hogan. / 

24. Hogan, Snyder, "Influence"; Phillips interview. 

25. Memos by Samford/ and Engstrom, dated Jan and Apr 57, in CCH files. 

26. Hogan, Howard Campaigne, "LIGHTNING," NSA Technical Journal, IV, 3 July 1959, 63-67; Tordella 
interview, Kirby interview. 

27. Hogan,Phillips/interview. 

28. Phillips interview. 

29. "History of ; AFSA/NSA Communications Center," correspondence file in CCH Series VI H.I.2.; "NSA's 
Telecommunications Problems, 1952-1968," unpublished historical study available in CCH Series X.H.4.; George 
Howe, "The Narative History of AFSA/NSA, Part V, Final Draft, Ch. XXVI-XXX," available in CCH. 

30. "History/of AFSA/NSA Communications Center." 

31. "Histor y of AFSA/NSA Communications Center"; videotape lecture on the history of NSA communications by 

[ available in CCH. 

32. "History of AFSA/ NSA Communications Center"; NSA/CSS Archives ACC 33707, H01-0108-6. 

33. "NSA's Telecommunications Problems " 



35. "History of AFSA/NSA Communications Center"; "NSA's Telecommunications Problems." 

(b) (i) 

lb) (3)-P.L. 86-36 
(b) (3)-50 USC 403 

(b) (3)-18 USC 798 ■ ' 

HANDLE VIA TALENT KEYHOLE COMINT CONTROL SYSTEMS JOINTLY 




DOCID: 3188691 ....---.5(b) (3)-P.L. 86-36 

36. "NSA Review of U.S. Cryptologic Effort . . .," in CCH Series VI.EE.l-;3. 

37. George F. Howe, "Centralized COMINT Communications Centers: ThV Historical Record," unpublished 
manuscript in CCH Series X.H.5. 



38 | j yidieotape; Tordella interview; CAHA, ACC 33707,1161-0108-6. / / 
39. "NSA's Telecommunications Problems. . ."; 



'The National Security Agency's Gray 



Telephone System: Present and Future," Telecom Career Panel paper, 19iJuly 1982. 

40. "NSA's Telecommunications Problems. .. ." /./ 

41. "Implementation of NSCID 7," CCH Series VLB.1.3. 

42. Edward Fitzgerald, "A History of U .S/ Communications Security: Post-World War II,: unpublished 
manuscript available in E324 j ^Theory of Wired Wheels/" 11 March 1955, in CCH Series VI EE.1.30; 



McConnell manuscript available in CCH; Ryon A. Page, "The Wirdd Wheel in U.S. Communications Security," 
unpublished manuscript in CCH Series VI.F.l .21. 

43. Fitzgerald. 

44. Book lecture, 1991 Cry ptologic History Symposium, available on videotape in CCH. 

45. Page. 

46. Page; David Boak, A History of U.S. Communications Security, rev ed 1973 (The Dave Boak Lecture Series). 

47. | paper; "Evolution of Equipment to provide COMSEC (lecture dated 1971) in CCH Series 



VI.F.1.6.; Oral History interview with Howard Rosenblum/14 Aug 1991, by Robert Farley and Henry Schorreck, 
NSA OH 03-91. 

48. Fitzgerald. 

49. Ibid. 

50. Burns. 

51. William Nolte, draft history of NSA, available in/CCH files. 

52. "COMSEC Material (Historical) 1957-1970," iri CCH Series VI.F.1.3. 

53. "COMSEC Historical Material." 

64. Ibid. / 

55. David Boak, written statement, Oct. 1994. / 

56. Memo for the Chairman, USCSC, "Capsule History of the USCSB, 12 January 1970," from the Executive 
Secretary, Thomas R. Chittenden, in COMSEC Historical Material. 



57. Fitzgerald; "Manufacture of COMSEC Keying Materials (S3)," in CCH Series VI.F.1.12. 

| 2 Feb. 1993, by Charles Baker and Tom Johnson, NSA OH 2- 93. 



58. Oral interview, 



59. Colons, V.I, 45. 

60. "Historical Study of NSA Telecommunications, Annual, 1973-1975," in CCH Series VI.A.1.10. 

61. David Boak, A History of US. Communications Security (The David Boak Lecture Series), 1973. 



HANDLE VIA TALENT KEVIIOLB OOMINT CONTROL SYSTEMS JOINTLY 
TOB*ECRefujyrBRA 224 



DOCID: 3188691 



62. Ibid. 

63. Boak; Howard Barlow speech at 1991 Cryptologic History Symposium. 

64. "Evolution of Equipment to provide COMSEC" (lecture dated 1971) in CCH Series VI.F.1.6. 
manuscript available in CCH. 



65. Boak. 
66. 
67. 

68. Ibid. 

69. Ibid. 

70. Ibid. 

71. Ibid. 
72. Ibid. 



'Evolution of Equipment. . Boak. 



'Evolution of Equipment. 



(b) (3J-P-.L. 86-36 



HANDLE VIA TALENT KEYHOLE COMINT CONTItOL OYOTEMO JOINTLY 
Nff)T MIT f ft nt p nn rnnfftmi ■, - ■ 



225 




DOCID: 3188691 



Chapter 6 
Cryptology at Mid-decade 



/7(b) (1) 
■•' / (b) (3) -50 USC 403 

/ (b) (3) -18 USC 79B 
/ (b) (3)-P.L. B6-36 



THE EARLY ASSESSMENTS 



It has become exceedingly difficult to obtain significant/information from covert 'operations 
inside Russia. The security zones at the border, the general restrictions in theii interior, the 

; si, \ 

thousands of security police, and the innumerable informers among the populace are brutally 
effective in limiting infiltration, exfiltration, and usefulness of agents, 'therefore, 4fa rriust more 
and more depend on science and technology to assist and to complement the b ! e : st efforts of 
classical intelligence. / \\ 

/ The KillianiBoard, 1955 

The Eisenhower adniinistratipn's intelligence focus was riot on traditional espionage - 
it was on technical intelligence; whence, Eisenhower knew/ through personal experience 
during World War II, he could obtain vast quantities of information. His concern over the 
apparent breakdown in COMINT during the Korean War caused him to refocus again and 
again on NSA. Reports about NSA's performance began io flow back to blip alnjost from 
the moment the Agency was created. The reports are/ important todayj ^because they 
indicate the direction that cryptology was to travel in subsequent years. 



The Robertson Committee 



The first reports on NSA were a product of President Eisenhower's conceirh with Soviet 



Capabilities. In the summer of 19S3, the/ National Security Council began 



examining America's strategic vulnerabilities, and, with it, the mtelligencjeisysteni that 
must provide the warning. But Canine adamantly opposed granting COMINT! clearances to 
the members of the panel, and USCIB backed him./ Instead, Canine estdbliihfed a largely 
in-house examination of COMINT, chaired by Dr. H/ P. Robertson of California ^Institute of 
Technology, a member of Canine's advisory panel, the NSA Scientific AdiviBory Bo^rd 
(NSASAB). Four of the seven members were frorii NSASAB, and the remaining two were 
from the Office of the Secretary of Defense. 1 



Robertson reported during th e dark days after "Black Friday," when 
was still an unrevealed mystery. 



The immediate result of this was the intercept, in 1954, 



Soviiet 



This opened up a new world 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL BYQTEM3 JOINTLY 
NOT RF!T .F. ^ c A pt it Tn T?rvT>T?TOM T.T n mint J i T n . 




DOCID: 



3188691 
Tge^fCfiETurv^RA 



"/i(b) (1) 

' /(b) (3)-50 USC 403 
I (b) (3)-lS USC 798 
i (b) (3)-E.L. 86-36 



The committee also recognized the indivisability of COMINT\and ELINT and 
stressed the effort to fuse both sources into asingle report. 2 / 

But Rober tson made plain that NS A must be in the game for the long pull . The long 
pull was Soviet and he urged an all-out attack on the new 



systems introduced in the early 1950s. His committee recommended the development and 
deployment of new intercept [ equipment. 3 



The Hoover Commission 



The Hoover Commission was a far larger effort. Established by Eisenhower in 1954 
and chaired by former president Herbert Hoover, it was at the time the most thorough re- 
examination of the federal government ever attempted. Hoover subcommittees delved 
into every cranny of the bureaucracy seeking improvements and economies. One such 
subcommittee was a task force chaired by General Mark Clark to investigate intelligence 
activities. The committee looked closely at NSA.* 

The thrust of the Hoover Commission set the mold for all subsequent panels. 
Responding to the entreaties of Canine, it recommended increased authority for NSA in 
virtually every area of its operation. NSA should have the authority to prescribe 
equipment standards; it should prescribe all intercept and processing standards; it should 
inspect service cryptologic training and direct modifications as necessary. There was 
almost no area in which it did not feel that NSA should be further empowered. 5 

What the panel did for NSA it also recommended for the SCAs. They should have 
more authority within their respective services, and each should be at the level of a major 
command. At the time only USAFSS was at that level, although ASA was granted major 
command status before the report was published. This left only NSG at a lower level 
within its service. It noted that "largely because of its status as a major command, the 
AFSS has developed a dynamic and promising program for recruiting, developing and 
holding on to technically qualified military career personnel." 6 The committee noted the 
dismal record of the three services in assigning people to cryptologic posts, and it 
recommended that security strictures be changed to permit military personnel offices to 
understand the importance of the jobs. 7 

More controversial was the panel's recommendation that NSA acquire additional 
authority over ELINT. Canine, who saw himself teetering over the black hole of 
interservice fighting, opposed this. He was having enough trouble unifying COMINT, 
without trying to swallow ELINT whole. USCIB noted that NSCID 17 had just been issued, 
and it urged that this new approach be tried before considering further integration of 
elint. (The impact of NSCID 17 will be discussed in chapter 7.) 8 

Clark and his committee proposed an all-out attack on Soviet high-grade ciphers, 
equivalent, in their words, to the Manhattan Project. It would require the best minds in 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 3Y3TEM3 JOINTLY 
NOT BELEABADLE TO FOREIGN NATIONALS 




228 



DOCID: 3188691 

!9&s«KEfujyns6A 

the country, equipped with the finest resources money could buy, but it would be worth it 



if even a portion of the Soviet ) systems were unlocked. Canine hailed 

the potential resource augmentation with glee, but cautioned against a total commitment 
before NSA had thoroughly analyzed the prospects for successs. USCIB supported him. 9 

Cryptologic personnel requirements weighed heavily on the committee. Clark urged 
an improved grade structure, including the addition of supergrades, higher pay for 
consultants, improve;! assignment of service officer personnel, better perquisites for NSA 
people assigned overseas (to be the equivalent of those received by CIA), and NSA 
exemption from the Classification Act. To improve the revolving door nature of military 
intercept operators (few of whom stayed in the service past their initial enlistment), Clark 
urged the assignment of civilians to intercept positions overseas. 10 

Clark and/his committee were concerned about two other potential problems. The first 
was the state of COMINT requirements, which were expressed in a document called the 
Master Requirements List. This, they said, was about the size of the Washington phone 
directory/and about as specific. And since customers wanted COMINT to tell them 
everything, without narrowing the target further, NSA simply specified its own 
requirements. This had been going on so long that there was danger that the cryptologic 
community would become completely isolated from its customers and insensitive to 
therd. 11 

/ What was occurring in requirements, they felt, was also true in security. COMINT 
security had become so tight that cryptologists were isolated from their customers. In time 
of war there was real danger that essential information would not get to the battlefield 
because of clearance restrictions. Thus the system would defeat itself and become a 
vestigial appendage. 12 It was a debate that would rage for years within the intelligence 
community. 

The Killian Board 

Eisenhower's preoccupation with the Soviet nuclear threat spawned a number of 
committees to look at American vulnerability. By far the most important of those was the 
Scientific Advisory Committee, commonly known as the Killian Board. In July of 1954 
Eisenhower asked Dr. James R. Killian of MIT to head a study of the country's capability 
to warn of surprise attack. Killian named a panel of the elite from academia, the scientific 
community, and the military. 



(b) (1) 

(b) (3)-P.L. 86-36 
(b) (3) -50 USC 403 
(b) (3)-18 USC 798 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 3Y3TEM3 JOINTLY 
NOT PFT ASADLE TO rOItEIOH NATIONALS 



229 



DOCID: 3188691 




Dr. James Killian, shown here with General Samford at NSA 



The committee quickly came to the conclusion that spying on the Soviet Union in the 
classical sense (agents and that sort of thing) was not the answer. The Soviet Bloc was too 
hard to penetrate. Warning, if it were to come in time, would have to come from technical 
intelligence like COMINT, ELINT, and photography. This recommendation was to begin a 
revolution in the way the government thought about, organized, and used intelligence. 
From that time on, technical intelligence became the "answer" to the problem of strategic 
warning. It would remain so for the duration of the Cold War. 

As part of the Killian Board, the Land Panel was to achieve a measure of renown. 
Chaired by the farsighted Edwin Land, inventor of the Polaroid camera, the panel was to 
concern itself with the development of new reconnaissance programs. The Land Panel 
came to have a profound influence on the future of overhead photography, the U-2 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL ST3TEM3 JOINTL T 
TOT RffT F * SABLE TO FOItEIQN NATIONALS 



230 



DOCID: 3188691 



(b) (1) 

(b) (3)-P.l. 86-36 
(b) (3) -50 USC 403 
(b) (3) -18 USC 798 



t9b-seC3Iti£m£ra 



program, and intelligence collection satellites. It was.this group that first envisioned 
COMINT and ELINT intercept packages aboard orbiting satellites. 

Land believed that science maide anything possible. I 



The Jackson Report \ 

The most personal and confidential report on NSA was by William H. Jackson. One of 
the original members of the Brownell|Committee, Jackson was appointed by Eisenhower 
to monitor NSA's progress and to m&ke periodic progress reports through Sherman 
Adams, Eisenhower's chief of staff. In Meetings with Jackson, the president expressed his 
personal concern that NSA should be effective, and Jackson kept him apprised of what still 
needed to be done. 

Jackson insisted that NSA needed 4 strong research and development organization, 
and he regarded the appointment of a director of research in 1956 as a significant step 
forward. A more difficult matter was the naming of a chief civilian deputy. Canine 
insisted on running his own show and did not want, and refused to appoint, a civilian 
deputy. Only when Samford came aboard in 1956 and quickly named a civilian, Joseph 
Ream, as deputy was Jackson satisfied on this point. 

Yet a third organizational problem w&s the matter of a point of contact for COMINT 
within DoD. Brownell had envisioned that COMINT matters would be handled at least as 
high as the assistant secretary level. This high-level attention had not occurred, and 
Jackson reported in 1956 that the nominaripoint of contact, General Graves B. Erskine, 
head of the Office of Special Operations, normally turned COMINT over to a lower-ranking 

staffer. In Jackson's view, this level of concern was wholly inadequate to the task at hand. 

\ 

The objective of all th is organizational toi ing and fro-ing was to put NSA in position to 
mount a full-scale attack "Only after such an attack has been made," 

Jackson noted, "can we determine safely, in the event of failure, that the effort is hopeless 
and the annual expenditure of forty odd millions can be saved." 14 

NSA was clearly still on probation. It was a probationary period that would not end 
with a bang but would slowly fade away. The corner was not turned during either the 
Eisenhower or Kennedy administration. NSA did not come off probation until the 
presidency of Lyndon Baines Johnson. 



HANDLE VIA TALENT KETIIOLE COMINT COM TOOL 3Y3TEM3 JOINTLY 
- NOT RELEAOADLE TO FOIUlIGII NATtUNALb ' 




DOCID: 3188691 




19S6 

(b) (1) 

(b) (3J-P.L. 86-36 
(b) (3) -50 USC 403 
(b) (3) -18 USC 7 98 



Certain years mark watersheds in cryptologic history. Nineteen fifty-six was such a 
year. Twin crises, Suez and Hungary, came virtually together in time to pressure a new 
NSA-managed COMINT system that had never been stressed in such a way. The 
conjunction of crises, rolled into a COMINT alert called. Yankee, resulted in short and long 
term changes to the system. It was a year for cryptologists to remember. 

Suez 

Suez was a significant benchmark 
in the postwar American involvement 
in the Middle East. It also represented 
the greatest crisis in the post- World 
War II Western Alliance. 

The creation of Israel in 1947 had 
been accompanied by war, dislocation, 
and bitterness. In 1952 the Egyptian 
government had been captured by 
hard-line pan-Arab, anti-Israeli 
nationalist military officers headed by 
Gamal Abdel Nasser. When Nasser 
officially took over the government in 
1954, he set a course which resulted in 
a distinct tilt toward the East. When, 
in 1956, the Western nations hedged on 
earlier commitments to fund a Nile 
dam at Aswan, Nasser courted the 




Gamal Abdel Nasser 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SYSTEMS JOIN T LY 
NOT TtKLE ftSABLE TO FOItBIQ W NATI0NAL3 



232 



DOCID: 3188691 




Soviet Union, and eventually secured finding there. Meanwhile, his relationships with 
Great Britain grew so strained that in Jtily of 1956 he nationalized the Suez Canal. At this 
point Great Britain and France began planning a military invasion to take back the canal. 
At the last minute they took Israel into the scheme, and they got the Israelis to agree to 
launch an invasion of their own. The restiltant fighting would give Britain and France the 
opportunity to come in as "peacemakers;" with sufficient armed forces to take back the 
canal. They did their best to keep the scheme secret from the American; government, 
whose attitude toward the Arabs appeared to be more even-handed. 




The Middle East in 1956 




HANDLE VIA TALENT KEYHOLE COMINTCOJ$TJS©fcSTSTEMS JOINTLY 
NOT RELEASABLE^&TTJlffilGNNATIONALS 



233 



TOPSEi 



DOCID: 3188691 



/(b) (1) 
(b) (3)-P.L. 86-36 
(b) (3)-50 USC 403 
(b) (3)-18 USC 798 



TOPSE£BH4*WJ6rA 



(b) (1) - 

(b) (3) 
OGA 




But the transition was only 
in its early stages when, on 29 October, 
the Israeli army struck Egypt in the 
Sinai. 

Secretary of State John Foster 
Dulles expressed shock and outrage. 
The outrage was real - the shock was 
made up. His own brother, CIA chief 
Allen Dulles, had sent him two 
national intelligence estimates earlier 
in the fall which predicted the 
invasion. 




Dulles was furious. 



Jobn Foster Dalles, Eisenhower's 
secretary of state, played a central role 
throughout the Suez Crisis of 1956. 




DOCID: 3188691 



(b) (1) 

(b) (3)-50 USC 403 
(b) (3)-18 USC 798 
(b) (3)-P.L. 86-36 



TO] 



UptflRA 



Timely reporting aVer a, period of months could have left no doubt 
within the administration that Soviet diplomacy ..consisted of posturing. They were not 
going to go down to the Middle East to\ba|i\ out anyone. Forces just weren*t,moving. The 
Soviets had their hands quite full with Hungary, tyhose crisis had flopped d° w n "'directly on 
top of Suez. " \ \\ 



But they in no way\approximated what was happening at. the 



ministerial level. \ \ \\ \ \ | 

| \ \ \ Such a strong alliance could not be 

torn asunder by Suez. As Peter Wright said ift his book Spycaicher, "Only GCHQ, which 
had a formal charter of cooperation with its Ariierican counterpart, the National Security 
Agency (NSA), under terms of the 1948 UKUSA ajn-eement,\remained relatively immune 
to the turbulent currents which battered the. previously intimate wartime Anglo- 
American intelligence relationship." 15 



Hungary \ 

For the Soviets, the real problem in 19$6 was the\East Bloc, ^Domestic Hungarian 
unrest culminated in a revolution that Sovifet troops p(it down violently in November of 
1956. \ 



The Hungarian revolution was a surprise to the; intelligence community. But as 
events gathered speed, the Soviet reaction was not. I \ I provided fairly complete 
indicators concerning Soviet military unit movements throughout the crisis. As Soviet 
forces m oved into Hungary and concentrated o n Budapest ik the waning days of October, 
jtraeked and identified the participants.1 \ 



little else available to the White House about the unfolding Soviet reaction. 



J^ther? 



was very 



The National Security Agency did not specifically predict that Soviet forces, would 



become involved - prediction was not its role. Th ere was enougt 

to lead one to that conclusion prior to the 



4 November Soviet take over of the capital. But no one drew the strings into a bund leX It 

^ poorly understood by customers. 



was all a hodgepodge of 



It was an opportunity lostV. 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL OYOTEME JOINTLY 
NOTREL F|ftfiftf*T T? ' m irnnTTTPM vi Amnuflir. 




DOCID: 3188691 



To&secffiTui 



RA 



The Yankee Alert 

Suez occurred on 29 October: Hungary broke on 4 November. 



Nineteen fifty-six was a bad time for NSA to get involved in crisis. The organization j 
was in the middle of its move from downtown Washington to Fort Meade. Some analytical I 
branches were in newly established quarters at Fort Meade, while others had remained? 
behind at Arlington Hall. Communications between the two geographical areas were; 
temporary, and much of the routine traffic was being couri ered four times a day front 
Washington. | 



(b) (1) 



HANDLE VIA TALENT KEYHOLE OOMINT CONTROL SYOTEMO JOINTLY 
NOT RELEA3ADLE TO FOREIGN NATIONALS 



(b) (31-P.L. 86-36 
(b) (3) -50 USC 403 
(b) (3)-18 USC 798 




236 



DOCID: 3188691 



(b) (1) 

(b) [3J-P.L. B6-36 
(b) (3)-50 USC 403 
(b) (3J-1B USC 79B 



TQ&SfiCRETUMtfRA 



Having no NSOC, NSA had to take extraordinary steps to deal with the crisis, f 



NSA technical support to the field was slow in coming. 



Lebanon, 1958 



The Eisenhower administration was pulled into the Middle East quite by accident in 
1956. But the president quickly yanked U.S. foreign policy into line with the new 
situation. In January 1957, in a State of the Union address focusing on the Middle East, 
he proclaimed what became known as the Eisenhower Doctrine: the United States would 
use its armed forces to help any country requesting assistance in maintaining its 
independence "against overt armed aggression from any nation controlled by 
International Communism." 22 Just two short years later, he employed the new doctrine in 
its first test. The occasion was Lebanon. 

Nasser had continued to extend his pan-Arabism, and he was the idol of the Middle 
East. In January 1958 he announced the formation of the United Arab Republic, an 
amalgam of Egypt and Syria, with Egypt clearly the dominant partner. The new UAR 
then launched a propaganda assault on the more conservative regimes in Lebanon, 
Jordan, Iraq, and Saudi Arabia. An arms race involving the U.S., Britain, France, and the 
USSR produced a Middle East that was "armed and dangerous." 

On 14 J uly pro-Nasser forces overthrew the Iraqi monarchy and assassinated the royal 
family. Camille Chamoun, who headed the pro- Western government of Lebanon, believed 
that he was next and hurriedly requested American assistance. Eisenhower believed that 
Nasserists were about to take over the oil supply and decided, on the spur of the moment, 
and after consulting with virtually no one, to come to Chamoun's assistance. He ordered 
the Sixth Fleet to the Eastern Mediterranean and instructed the chairman of the JCS, 
General Twining, to put Marines ashore in Beirut the next day. Harold MacMillan, the 
British prime minister, requested that it be a joint operation, but Eisenhower wanted a 
unilateral action, and he suggested that British paratroops be deployed to Jordan rather 
than Lebanon. 23 



HANDLE VIA TALENT KEYHOLE OOMIKT CONTROL 3YQTEM3 JOINTLY 
T-JOT RFT E ft SABLE TO FOREIGN NATIONALS 



237 




DOCID: 3188691 



\(b) (1) 

\b) (3) -50 USC 403 
|b) (3) -18 USC 798 
(b) (3)-P.L. 86-36 



DOCID: 3188691 



(b) (1) 

(b) (3)-P.L. 86-36 
(b) (3)-50 USC 403 
(b) (3)-18 USC 798 



RET UMBRA 



1956 in History ,\ \ 

By the end of 1958, the United Stales was firmly in the Middle East, 



\By the time of the 1967 Ara b-Israeli War, 

The problem 



proved difficult to address because of thie wild mood swings between somnolence and war 
in the Mi ddle East. But the cryptologic Community eventually had a core of expertise and 
resource s! 



The Hungarian crisis marked the downing of a new capability. 



Unfortun ately, such sophisticated analysis, available in later decades, simply did not 
exist in 1956.1 T~ 



r 



be learned. 



It was an art form that had to 



As for crisis response, all was chaos. The cryptologic community proved incapable of 
marshalling its forces in a flexible fashioH to deal with developing trouble spots. The 
events of the year did not demonstrate success - they simply provided a case study to learn 
from. \ 



The Reorganization 

I 

Ralph Canine departed NSA on 23 November 1956. But before he did, he hired the 
management firm of McKinsey and Company to look at NSA's organization from top to 
bottom. The McKinsey study resulted in a thorough revamping of the way NSA functions 
that still had repercussions through the 1980s] 

Canine was concerned with primarily twojquestions: would operations function more 
effectively on a functional or geographic organization, and to what extent should staff 
functions be centralized? j 

McKinsey introduced a modified geographical concept. Organization for COMINT would 
be along target (i.e., country or geographical^, lines, but within that scheme, specific 
processes like cryptanalysis, and resource tasking, would often appear 

in separate organizations. The new scheme brought with it a greater focus on targets, but 
retained many aspects of the factory-like origins of the business. 



HANDLE VIA TALENT KEYHOLE OOMINT CONTROL DYOTEMO JOINTLY 
WOT T?ffT ffASABLE TO FOREIGN NATIONALS" 




DOCID: 



3188691 



/(b) (1) 

/ (b) [3)~E.L. 36-36 




When the team presented its findings to Canine only a few/a'ays before his retirement, 
it showed him a new organizational concept. Gone was the aid numerical organizational 
system, replaced by pronounceable syllabic office designators. Thus t)DO became PROD, 
and within PROD were four major offices: / j 

GENS- 
ADVA 
ACOM 
ALLO 

The principle of pronounceable syllables was carried through the Agency. For 
instance, MATH was the Mathematical Research Division within R&p; RADE was the 
Radio Equipment Division; STED was the Communications Security Division; PERS was 
personnel; MPRO (pronounced em-pro) was machine' processing; SEC wis security, etc. It 
was a profoundly rational way to designate offices, but it did not do a, very good job of 
obscuring office functions from an inquiring public. Ultimately, that wais to spell the end 
of the pronounceability craze, although the basic organizational scheme Would continue to 
the end of the Cold War. 

As to the second question, relating to centralization of staff functionsjMcKinsey came 
down heavily on the side of decentralization. The firm viewed the director, as being far too 
involved in day-to-day management of Production and only distantly concerned with the 
easier-to-manage COMSEC and R&D organizations. To correct $h!is, McKinsey 
recommended that a virtually independent Prod uction function be created. AH ancillary 
functions would be gathered up under PROD, 



Jand even some 



logistics functions. It was a powerhouse organization. 

The director's staff was reduced in proportion to the matters transferred to PROD.j 
Gone were such offices as Headquarters Commandant and Adjutant Generals, Army-typef 
organizations whose very meaning4s obscure today. To manage a potentially unwieldyj 
Production organization, McKinsey created the staff system that carried through the Cold 
War: the 02, 03, 04, etc., way of stajf organization. j 

By far the biggest org anizati on in the Agency was GENS. Out of just over | I people 
assigned to PROD, almos ^ [ called GENS ho me. The GEN S organizational system, ak 
modified by a 1957 re-reorganization, created a organizationa l schetoe thajt 

retained its character for more than thirty years. 
GENS-21 



GENS-1 



JGENS-3 



mdGENS- 6 



j SENS-4f 



GENS-S , 



McKinsey was concerned about COMSEC. Once the move to Fort Meade took place, 'it 
would be physically divorced from the rest of NSA. To accommodate, this, the firim 



(b) (1) 

(b) (3) -50 USC 403 
(b) (3)-18 USC 793 
(b) (3J-E.L. 36-36 



HANDLE VIA TALENT KEYHOLE COMINT CONTItOL SYPTE - MO JOINTLY 
twit pct v a g a pt p w rnnmr-M y 1 mrny ■ t o- 



TQMECrET U M43RA 240 



DOCID: 3188691 




recommended special decentralization authority for COMSEC, including certain aspects of 
physical security, supply, and engineering. 

The R&D organization, said McKinsey, should stick solely to research and 
development. Development of off-the-shelf equipment applications, local component 
fabrication, equipment repair, or anything that involved known or proven technologies, 
should come under some other organization - most notably, PROD. Regarding the fielding 
of COMSEC equipments, unless it involved pure research, it was not properly an R&D 
function, McKinsey said, and should be resubordinated to COMSEC. This was an issue, 
however, that would be replayed many times during the Cold War,. 27 

THE MOVE 

It is desired that you take immediate action to recommend for my approval a suitable location for 
the Armed Forces Security Agency within a 25-mile radius of Washington . . . the new site survey 
should be carried out as a matter of high priority 

William C. Foster, Deputy Secretary of Defense, 1951 



When AFSA was created in 1949, it was without its own facilities. The new 
organization was forced to borrow space at Arlington Hall and Naval Security Station 
(NSS). 

In an appendix to the document that created AFSA, the JCS directed that AFSA 
prepare a plan consolidating COMINT and COMSEC into a single facility. After studying the 
problem, AFSA concluded that the two could not be consolidated into their existing 
buildings at Arlington Hall and Nebraska Avenue. In its September 1949 report to the 
JCS, AFSAC pointed out that the buildings in use at Arlington Hall were temporary 
structures designed for wartime use. 28 

In the autumn of 1949, with the explosion of the Soviet nuclear device, atomic hysteria 
was sweeping Washington. To its original charge, the JCS added one other - that a 
standby location be procured which was outside the Washington area to minimize the 
possibility that American cryptologic capabilities be destroyed on the first day of a war. 29 

Commander Arthur Enderlin, whom Admiral Stone had appointed to chair the study 
committee, was adamantly opposed to a standby location. He and his committee 
considered it a waste of money and refused to recommend an alternate site. The JCS 
demanded a recommendation, but Enderlin refused. Stone reiterated the order - Enderlin 
remained unmoved. Stone fired Enderlin and in his place appointed Captain Thomas 
Dyer, one of the leading cryptanalysts of World War II. Dyer was a known advocate of the 
alternate location concept. 30 



I IANDLE VIA TALENT KEYHOLE COMINT CONTROL OYGTEMO JOINTLY 
NOTRF,I,EA ,fii»imii'T"F'HlliriM '111 ) I r " 



241 




DOCID: 3188691 




But then Dyer turned the solution on its head. He recommended that the alternate 
become primary - this would effectively move the cryptologic headquarters out of 
Washington. Dyer carried the day, and his committee began to look at possible relocation 
sites in the spring of 1950. The selection criteria were developed over a period of months, 
but generally focused on the following requirements: 

a. Be within twenty-five miles of a city of at least 200,000 

b. Have work space totalling at least 700,000 square feet 

c. Possess a "reasonably equable climate" 

d. Be suitable for complete physical isolation by fences and the like 

e. Be accessible to mainline air, rail, and highways 

f. Not be less than twenty miles from the Atlantic Ocean 

g. Possess dependable and secure water and electric power sources 

h. Be accessible to commercial and military communications 31 




HANDLE VIA TALENT KEYHOLE GOMINT CONTROL SYSTEMS JOINTLY 
Tvrrvr rit.i .g a <; apt*- to T?nnirTf»T tit l ninw» n — 



242 



DOCID: 3188691 




The basic ground rule was that the location selected had to be on an existing military 
base. The move was to be completed by July 1955. One option the board looked at was to 
select a site that already possessed a building - like a hermit crab, APSA could simply 
crawl in after modifying the shell. Locations in Kansas City, Tulsa, and St. Louis were 
considered. Another option was to construct a new building on a military installation. 
The board looked at Fort Knox, Kentucky; Fort Benjamin Harrison, near Indianapolis; 
Fort Meade, halfway between Baltimore and Washington; Brooks Air Force Base, near 
San Antonio, Texas; and Rocky Mountain Arsenal, near Denver. 38 

Then in early 1951 the board sent AFSAC two recommendations - if the existing 
structure criterion were used, Kansas City should be the choice, and if a new building were 
wanted, Fort Knox was the way to go. This produced great controversy in AFSAC. Some 
pressed for an existing structure, maintaining that the lower cost and quick availability 
would help meet the July 1955 deadline. Others opposed moving into someone else's 
offices - that had been tried at Arlington Hall and Nebraska Avenue and had not worked. 
The Air Force pressed for Fort Knox, contending that it was less vulnerable to a Soviet 
nuclear strike. Stone and Major General Canine (who would soon become director of 
AFSA) both opted for Fort Meade. But in the end AFSAC voted for Fort Knox. The JCS 
approved the Fort Knox option in April, but only after another heated argument about the 
advisability of moving to a relatively isolated location. Many, including Stone and 
Canine, were concerned about the critical lack of housing in the Fort Knox environs, and 
some wondered if the their civilians would accept the choice. 33 

While orders were being cut and contract proposals were being written for the Fort 
Knox construction, AFSAC members argued vehemently over the functions to be moved. 
Dyer was the author of a plan to split comint into two parts - three-fourths of it would 
move to Kentucky, while some residual functions would stay in Washington, along with 
most of COMSEC and some liaison offices. He was opposed by Admiral Joseph Wenger, who 
felt that splitting COMINT would be disastrous. Ultimately, Wenger won, and it was 
decided to leave COMSEC in Washington, while all of COMINT would move to Fort Knox and 
Arlington Hall would be closed. 34 

The board knew Fort Knox to be objectionable to some of the civilian employees 
because of its distance from Washington. The lack of housing was worrisome, as was the 
rigid segregation practiced in Kentucky in 1951. But AFSA pressed ahead with the 
selection anyway, until a startling thing happened: Someone decided to ask the civilians 
what they thought. 

No one knows now who originated the civilian opinion survey, but by May of 1951 it 
was being circulated at Arlington Hall and Nebraska Avenue. The results were a show- 
stopper. Most of the civilians planned to resign rather than go to Fort Knox. 35 Without 
them, AFSA would find it difficult to operate. The problem had to be fixed. 



HANDLE VIA TALENT KEYHOLE COMINT OONTIIOL OYOTEMQ JOINTLY 



243 




DOCID: 3188691 




The matter came to a head in October of 1951. Deputy Secretary of Defense William C. 
Foster told Canine, the new director of AFSA, that he had a problem. AFSA's civilians 
were not in favor of the move to Fort Knox, and neither were AFSA's two most important 
non-DoD customers, the State Department and CIA. Canine went directly to see General 
of the Armies Omar Bradley, the Army chief of staff. Bradley told him to meet with the 
JCS. At the JCS meeting in early December the Fort Knox move was cancelled, and 
Canine was directed to appoint another site selection board. 

Canine's new selection board, still chaired by Dyer, but including some civilians, held 
hurried meetings in January and February of 1952. The new site had to be between five 
and twenty-five miles from the center of Washington. This placed it within the postulated 
blast zone of then-existing Soviet atomic weapons and thus violated a JCS stipulation that 
the new AFSA site had to be at least twenty-five miles from the Washington Monument. 
But Soviet atomic weapons were progressing all the time, and the twenty-five mile limit 
no longer made sense anyway. The JCS could have either atomic invulnerability or a 
skilled civilian work force, but apparently it could not have both. 36 

The board looked at several sites in suburban Virginia, including Fort Belvoir, some 
land along the George Washington Parkway inhabited by the Bureau of Roads (later to 
become famous as the site of the new CIA headquarters building), and Fort Hunt. In 
Maryland, it considered several sites within the Beltsville Agricultural Research Center, 
White Oak (site of the Naval Ordnance Laboratory), Andrews Air Force Base, and Fort 
Meade. 

Of those, Fort Meade was the only one on the original list. It was twenty-two miles 
from the Monument, the furthest removed of any site considered the second time around. 
Despite the distance from Washington, transportation difficulties would be solved by a 
new parkway then under construction between Washington and Baltimore. There was 
plenty of vacant land on Fort Meade for construction of headquarters and life support 
buildings. It was the obvious choice, and on 5 February it became official. (Considering 
that Canine said he had already selected Fort Meade himself, and had informed Lovett of 
that, the proceedings of the board may well have been window dressing.) 37 

Fort Meade, named for the Civil War victor at Gettysburg, inhabited a thickly wooded 
13,500 acre tract precisely halfway between Baltimore and Washington. Originating as 
Camp Meade during World War I, it had been a training facility during both World Wars I 
and II. During World War II some 3.5 million men passed through on their way to Europe 
and at the peak of the war 70,000 people inhabited the post. After the war it became a 
headquarters, first for the 2nd Army and later (in 1966) for the 1st U.S. Army. 

When Canine first looked at it, Fort Meade consisted of hundreds and hundreds of 
temporary wooden structures being used as barracks, offices and training facilities, with 
only a few permanent brick buildings. The corner of the post that NSA proposed to use 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 0Y3TEMQ JOINTLY 




244 



DOCID: 3188691 



I0E-S€CT?ET u^bra 

was uninhabited, but was near a major intersection - the new Baltimore-Washington 
Parkway and Maryland Route 32. 38 

The new building would be U-shaped with double cross-members, designated the 
center and west corridors. Entry would be in the middle of the west corridor, the portion of 
the building facing Route 32. At 1.4 million square feet, it would be the third largest 
government building in Washington, smaller only than the Pentagon and the new State 
Department building. But it was designed for the AFSA population in 1951, and it did not 
take into consideration the growth that took place up to mid-decade, which left the new 
building critically short of space. The only solution was to leave someone behind, and that 
"someone" became the COMSEC organization, which remained at Nebraska Avenue until 
another building was completed in 1968. 39 

In 1954 a contract was awarded to two co-prime contractors, Charles H. Tompkins 
Company of Washington, D.C., and the J.A. Jones Company of Charlotte, North Carolina. 
The contract price was $19,944,452. Ground-breaking occurred on 19 July 1954. When 
the building was completed, the total cost turned out to be $35 million, an overrun of 
almost 100 percent. 40 




Barracks under construction, 1954 



HANDLE VIA TALEMT KEYHOLE 0OMINT CONTROL SYSTEMS JOINTLY 
Hffvr nvx i? a «« is m tt rn nnnTiitniT m twwihi t _g 




DOCID: 3188691 




A few miscellaneous facts wowed the local community. It had the longest 
unobstructed corridor in the country, 980 feet long (center corridor). At its birth it had a 
German-made pneumatic tube system that could carry papers at twenty-five feet per 
second and could handle 800 tubes per hour. The cafeteria could seat 1,400, and the 
auditorium (later dedicated to William Friedman), 500. As its new occupant, NSA would 
become the largest employer in Anne Arundel County. 41 It was a far cry indeed from the 
quaint but antiquated Arlington Hall, the stately Naval Security Station, and the firetrap 
A and B buildings at Arlington Hall. 

NSA handled the move in stages. There was an "interim move," which put parts of 
NSA's operation into temporary quarters on Fort Meade. This had the advantage of 
moving the operation gradually so that large parts of it were not shut down for any period 
of time. The new operations building would not be ready for occupancy until 1957, and so 
the interim move also had the advantage of placing cryptologists at the new location in 
advance of the July 1955 deadline. 




Headquarters construction, 1955, south wing 



HANDLE VIA TALENT KEYHOLE GOMINT OOMTItOL OYOTEMU JOINTLY 
MOT RELBACADLE TO FOREIGN NATIONALS 




246 



DOCID: 3188691 




It began with an interim move to four brick barracks constructed for NSA use in 1954 
just behind the proposed site for the main complex. The first to arrive, in November of 
1954, was a contingent of 149 Marine guards to provide security. The other 2,000 plus 
people taking part in the interim move included virtually the entire population of GENS, 
plus enough communicators, personnel, and logistics people to keep them going. Heat for 
the operation was provided by an old steam engine which was brought in on the old 
Baltimore, Washington and Annapolis tracks, and was installed in a small copse of trees, 
which still exists, between the present OPS2A and the barracks area. (In fact, the original 
barracks themselves, now converted to living quarters, also still exist.) 

GENS and its support staff became an outpost, connected to the main headquarters by 
inadequate electrical communications. Most classified material was couriered back and 
forth four times a day - the electrical circuits were reserved for only the most critical and 
time-sensitive information. 42 




The NSA operations building in 19S7 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SYSTEMS J 01N T L Y 

^TBITTBAPHmii"rOT?r 



247 T^E^tC^ETU^RA 



DOCID: 3188691 




To NSA's military population, the move to Fort Meade was a matter of routine. The 
military moved frequently, and the relatively cloistered atmosphere of a rural Army post 
was closer to the normal state of affairs. Family housing was of the two-story brick 
variety, constructed under the Wherry Housing Act. More would be. needed, and over 
2,500 new Wherry units were planned to accommodate the increased military population 
occasioned by NSA's move. 43 

For civilians, however, it was an entirely different matter. The move to Fort Meade 
was initially contemplated nervously by a standoffish civilian population. Most lived in 
Virginia and Washington and faced a long commute over narrow and traffic-clogged roads 
through the heart of a major metropolitan area. There was no beltway.to take traffic 
around Washington - the trip north would have to be via Georgia Avenue, Colesville Road, 
New Hampshire Avenue and other city streets. The only plus to this situation was the 
brand new Baltimore-Washington Parkway, whose projected completion date was January 
1955. That would take care of the drive north from Anacostia and would mark a very 
significant reduction in the driving time. 

For those who did not own cars (a significant number in the early 1950s), there was 
public transportation. Although the old Baltimore, Washington and Annapolis Railroad, 
which had a spur that ran across the street from the planned NSA facility, had closed its 
passenger service in 1935, the Baltimore and Ohio Railroad still operated commuter train 
service from Washington's Union Station to Laurel. For $1.82 per day, one could travel 
round trip to Laurel and back in thirty-six minutes aboard one of the two trains operating 
each morning and afternoon. Once in Laurel, the commuter could take the railroad- 
operated shuttle bus to Fort Meade for an additional round trip fare of 500 ; it required 
twenty-three minutes each way. 

Unfortunately, the train and bus schedules did not match very well, and there was no 
bus service at all for a commuter catching the late train. For the early train, the total one- 
way commuting time from Union Station to NSA was one hour and twenty-three minutes, 
not including the time required to get from one's residence to Union Station. Both 
Greyhound and Trailways offered bus service from downtown Washington to Laurel in just 
thirty-seven minutes, and at 99f£ per round trip, it was a bargain. But neither service 
brought passengers to Laurel in time to catch the shuttle to Fort Meade, so commuters 
would be left high and dry in Laurel. For urbanites used to a short commute to Arlington 
Hall, this was not a happy prospect. 44 

For most, this meant picking up the family and moving to the Maryland suburbs. To 
help with the move, NSA created the Meademobile, a trailer parked between A and B 
Buildings at Arlington Hall. The Meademobile carried information about Fort Meade and 
surroundings, including real estate ads, school and church information, and locations of 
shopping areas. On Saturdays NSA ran a special bus to Fort Meade so that employees 
could look over the area. For those who were still unsure, NSA announced that a move to 



HANDLE VIA TALENT KEYHOLE OOMINT CONTROL 3Y3TEM3 JOINTLY 




248 



DOCID: 3188691 




Fort Meade would be regarded as a PCS, and the government would pay to move household 
effects. For many, that was the decider. 45 

The closest community of any size was Laurel. Housing prices in Laurel ranged from 
$8,990 for two bedroom homes to $10,990 for three bedroom homes with basements. There 
was also a supply of apartments which could be had for rents ranging from $79.50 to 
$112.50 per month. In the other direction was the waterside community of Severna Park, 
whose houses ranged in price from $6,000 to $16,000. Waterfront lots could also be 
purchased in the subdivision of Ben Oaks, but the lots alone sometimes ran as high as a 
finished house in other areas. A little farther afield was Glen Burnie, where housing 
prices ranged from $5,995 to over $10,000. South was the planned community of 
Greenbelt, in the Washington suburbs. This was originally built with government 
subsidies, and a house there could be had for as low as $4,700. Single bedroom apartments 
rented for $51 and up. 48 Columbia had not been built yet. 




The Meademobile at Arlington Hall Station, 1954 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL QY3TEM3 JOINTLY 
NAT pyT a g a pt p th rrmTTTfiM it i wrnv a t n 



249 




DOCID: 



3188691 




The Saturday bus to Fort Meade, 20 April 1954 



Whatever NSA did to entice civilians out to Fort Meade, it worked. Early estimates of 
civilian attrition by a panicky personnel office had ranged as high as 30 percent, but the 
actual attrition rate was less than two percentage points higher than would normally have 
been expected had there been no move at all.* 8 By anyone's standards (except for the 
COMSEC population left behind at Nebraska Avenue), the move was a success. 



HANDLE VIA TALEJIT KEYHOLE OOMIMT CONTROL SY3TEM3 JOINTLY 
NOTffffT \Sx\CLE TO FOREIGN NATIONALS 




250 



DOCID: 3188691 



(b) (1) 

(b) (3J-P.L. 86-36 
(b) (3)-50 USC 403 
(b) (3)-18 USC 798 



•'(b) (3)-P.L. 86-36 



UMBRA 



Notes 

1 . Howe, draft report on the Robertson Committee, in CCH Series' VT.X.l .4. 

2. Robertson report, in CCH Series VI.X.1.6. 

3. Ibid. 

4. "Report on Intelligence Activities in the Federal Government, Prepared for the Commission ori Organization of 
the Executive Branch of the Government by the Task Force on Intelligence Activities," [The iClark Committee of 
the Hoover Commission] App. 1, Part 1: The National Security Agency, May 1955, in CCH Series! VI.C.1.8. 

5. Ibid. 

6. Eisenhower Library papers, available in CCH Series XVI. 

7. Hoover Commission. 

8. Ibid; Eisenhower Library papers. / 

9. Hoover Commission; Eisenhower Library papers. 
•10. Hoover Commission. 

11. Ibid. 

12. Ibid. 



14. Eisenhower Library papers. 

15. Peter Wright (with Paul Greengrass), Spy Catcher: The Candid Autobiography of a Senior In telligence 
Officer (N ew York, Viking Penguin, 1987), 98. The details of the Suez crisis are well documented in£ 



The Suez Crisis: A Brief COMINT History, U.S. Cryptologic History, Special Series, Crisis Collection, 



V.2 (Ft. Meade: NSA.1988). 



21. Ibid. 

22. T.G. Fraser, The USA and the Middle East Since World War II (New York: Simon and Schuster, 1989), 73. 

! 
5 

23. Stephen A. Ambrose, Eisenhower, Volume 2: The President (New York: Simon and Schuster, 1984), 469-73. 



HANDLE VTA TALENT KEYHOLE COMINT CONTROL SY3TEM3 JOINTLY 




DOCID: 3188691 



JKM^SECfiETUMMA 




25. Ibid. 



27. The McKinsey study and documents pertaining thereto are contained in ACC 26115, CBNE 48 and in the 
Garman Study. Personnel figures came from ACC 39741, HO-0311-4. 



28. CCH Series V.F.6.1. 



29. CCH Series V.F.5.I., VXAA.1.5. 



(b) (1) 



30. CCH Series VI.AA.1.5. 



(b) (3J-P.L. 86-36 
(b) (3)-50 USC 403 
(b) (3) -IS USC 798 



31. CCH Series V.F.5.1. 

32. CCH Series V.F.5.1. and VI.AA.1.5. 

33. CCH Series VI.AA.1.5. 

34. CCH Series V.F.5.1., VI.AA.1.5.. 

35. CCH Series V.F.5.2.. 

36. CCH Series V.F.5.1. 

37. CCH Series V.FiS.l. 

38. CCH Series Vl.D.2.5. 

39. NSA/CSS Archives ACC 26404, CBOM 16. 

40. CCH Series VI AA.1.1. 

41. Washington Post, 20 June 1957 

42. VI.AA.1.1.; "Study of the Security Division," Feb 1955, in CCH Series VI.G.1.1. 

43. Memo, G. B. Erskine to Secretary of Defense, 21 May 1954, in CCH files. 

44. CCH Series VI.AA.1.3. 

45. CCH Series VI.AA.1.1. 

46. CCH Series VI.AA.1.3. 

47. CCH Series VI.AA.1.3. 

48. CCH Series VI.E. 1.4. 



HANDLE VTA TALENT KEYHOLE COMINT CONTROL 3VBTBMS JOINTLY 

TJflT BUT .F A g A RT V ?f\ Ii-nT?Ti-Tm>T M H TTnW A T H 




252 



DOCID: 3188691 




RA 



Chapter 7 
The Eisenhower Reforms 



THE POST-CRISIS CENTRALIZATION OF THE SIGINT SYSTEM 

Following the mid-decade crises of Hungary, Suez, and Sputnik, President Eisenhower 
instigated a thorough reexamination of the intelligence system. For NSA, this meant 
sweeping changes and new challenges. 

Criticomm 

The long-stalled COMINT Comnet proposal was not jarred loose until the Sputnik crisis 
of 1957. Sputnik came as a complete surprise to the Eisenhower administration. 
Following as it did after Suez, Hungary, and Lebanon, it caused Eisenhower to focus hard 
on intelligence warning issues. Part of the administration's concern was for timely 
warning, and that meant timely communications. The Critical Communications 
Committee (CCC), which had representatives from various governmental organizations 
(including NSA), proposed communications criteria which clearly would require a totally 
new system. 

The committee defined critical information (they called it "Critic" information, the 
first time the term came into use) as that information "indicating a situation or pertaining 
to a situation which affects the security or interests of the United States to such an extent 
that it may require the immediate attention of the president and other members of the 
NSC." The CCC then stipulated that such Critic information should get to the president 
within ten minutes of recognition that it meets Critic criteria. 1 

It sounded like pie in the sky. No communications system then in existence could 
come close to meeting a ten-minute deadline. (Ten hours was more like it.) 

When USCIB began looking at various proposals, the system that most closely 
resembled what the CCC wanted was the COMINT Comnet, which was still a mythic 
concept. Negotiations between NSA and the services had broken down, and the Air Force 
had even de-funded a previously agreed-to plan to open the first relay station at 
Chicksands. 2 The second Robertson Committee (see p. 259) strongly supported the 
establishment of the Comnet as a high-priority requirement, but noted that the CCC was 
already working in that direction anyway. 3 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL HYSTEMO JOINTLY 



253 




DOCID: 3188691 



TQESKKETuyBRA 

In July 1958, the JCS approved a plan for a new Criticomm system. It involved 
establishing a network of automated relays worldwide, building on the rudimentary 
COMINT circuitry that NSA and the services had put together. The pattern the JCS used 
was the fledgling COMINT Comnet, and the expertise came from NSA. The new program 
was promulgated by the DCI as DCID 1/8, "Handling of Critical Communications." 4 

The DCID jumped the gun a little; Eisenhower had not yet been briefed. In August of 
1968 General Samford, who had been in the traces for two years, and Louis Tordella, who 
had been NSA's deputy director for only a few days, were summoned to the White House to 
brief the NSC on the proposal. Tordella, who did the briefing, sold the program by 
stressing that at least 90 percent of the expected Critics would come from COMINT and that 
the COMINT Comnet proposal would enfold fully 200 out of the 245 potential entry points 
for critical information. The draft directive, NSCID 7, was already written and ready to 
go. All they needed was Ike's go-ahead. After Tordella had finished talking, the president 
turned to Donald Quarles, his deputy secretary of defense, and asked, "Don, can we do it?" 
Quarles said, "Yes, I think we can." "Let's do it," was all the president said, and it was 
done. 5 




President Eisenhower 

His concern about strategic warning led to the creation of Criticomm and the Critic program. 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 0Y0TEM3 JOINTLY 
WIT RE-.I g A o A pt v -vn, vnim-jn^r »nm n i T .rn 



TQB^KRET UMBRA 254 



DOCID: 3188691 woi-p-l . 86 -36 




The new NSCID made the secretary of defense the executive agent, and it decreed that 
the system would consist of the existing COMINT communications system augmented and 
modified as necessary. The DCI would establish Critic criteria. NSA was not mentioned, 
but it was hardly necessary. The JCS had already named NSA to manage the system. It 
was to be completed by 1961. 6 

No one was really sure how NSA would magically produce a system that could meet 
the ten-minute timeliness goal. COMINT communications at the time were a lash-up of 
NSA and service communications. Communication centers werje basically "torn-tape" 
relays, and there was no hope of getting anything to the White House in that sort of time 
frame. NSA had been working on an automated switching device for several years, but 
had not yet come up with a switch that was acceptable to all parties. In this atmosphere 
someone would have to improvise. 

NSA's communicators, headed by Arthur Enderlin, Max Davidson, and 
began tinkering with off-the-shelf commercial hardware that would permit a Critic to 
steam through the system untouched by human hands. A key element in their search was 
the shunt box, a device invented by Teletype Corporation that could recognize a unique 
combination of letters (for instance, ZZZ) and open up circuitry all the way to Washington. 
Nothing else would flow in that path until the "express train" had passed through. 7 

Back in Washington, NSA had created a system of direct communications, called 
ZICON, with its Washington-level customers. This communications group was expanded to 
include all organizations on distributions for the initial Critic. This included, in the early 
days, the White House and members of USIB (less FBI and AEC). Later, SAC (Strategic 
Air Command), ADC (Air Defense Command), TAC (Tactical Air Command), and 
STRICOM (Strike Command) were added and still later, the other Unified and Specified 
Commands. 8 

The advent of the KW-26 cryptoequipment was critical to the functioning of the new 
system. With it, the system speeded up to 100 words per minute, and messages zipped 
through at almost twice the previous speed. 

Criticomm needed relay centers, and in 1959 NSA directed that the Army operate 
centers in Europe, Eritrea, the Philippines, Okinawa, and Japan. The Navy would do the 
job in Hawaii, while the Air Force would take on the same responsibilities in England, 
Turkey, and Alaska. NSA would operate the central hub at Fort Meade. At the same time 
the TCOM organization, which had so recently been subordinated to Prod, was once again 
made independent, in recognition of its new standing. 9 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 3Y3TEM3 JOINTLY 
mT pet .km q a pt b- to rrnmiTr-nr ir t, rmnwn a 



255 




DOCID: 3188691 



TQ&«CRffujyT^RA 



Through these and other hasty improvements to the system, NSA was able to report a 
dramatic improvement in handling time. In the early days of the program, Critics 
averaged one and one-half hours to reach the White House. Two years later, the time had 
been reduced to a mean elapsed time of ten minutes. Criticomm was still operated with 
jury-rigged equipment, but already the timeliness goal of having all Critics to the White 
House in ten minutes was within sight. 10 



The Baker Panel 

In 1957, two high-level committees 
were taking independent and 
simultaneous looks at NSA. Both were 
to have a long-range impact on 
American cryptology. 



The Baker Panel was appointed by 
President Eisenhower to recommend to 
him whether or not there was a 



L 



J Chaired by 



7 



William O. Baker, vice-president for 
research at Bell Laboratories, the 
committee quickly strayed from its 
intended charter. Baker wanted to 
look at everything, and his 
examination became the most 
intensive look at the cryptologic 
process ever performed by an outside 
organization. 11 




William O. Baker 



When Baker delivered his report to Eisenhower in February 1958, he began by 
answering the question directly put to him by the president: 

No national strategy should be based on the hope or expectation that we will ) 
| | ;-...... Even with the greatest optimism, it is clear that no. substantial 



(b) (1) 

(b) (3) -50 USC 403 
(b) (3)-18 USC T98 
(b) (3J-P.L. 86-36 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SYSTEMS JOINTLY 
NOT BELEAOADLE TO FOREIGN NATIONALS 



TOESEeRETuyriRA 256 



DOCID: 3188691 



Tge^ecffETuyBRA 



But this, said Baker, was not the whole story. Cryptology was a tremendously 
valuable asset to the nation, one which was producing most of the fast and reliable 
intelligence then available. It was doing it, 



py putting together all the iisciplines^ 



^ ^ ^ ^TKe 

cryptologic system was capable of squeezing out of the ether a veritable cornucopia of 
information, if it were properly managed and funded. And this, said Baker, was the focus 
of his recommendations. 

In order to pr operly employ the cryptologic syst em, NSA needed to focus on the 
important things. | | had monopolized the talents of too 



L 



many smart people. They should be spread throughout the organization,/ 



This 



meant, in many cases, realloc ating resources to ALLO and AC OM or to different divisions 

What they had learned working! 



could, now be employed against othej 



NSA should forget about, developing a general-purpose computer and go for more 
RAMs. Baker was not impressed with Project LIGHTNING; he wanted smaller but more 
costieffective efforts. , 

The Agency was receiving stupendous volumes of intercepted material, a product of 
the rapid expansion of overseas collection sites. Computers should be employed in 
processing this take, so that analysts could be free from manually logging 



Machines should also be employed at collection sites to reduce the pile of material that had 
to be forwarded. This, to Baker, was the next great field of computer applications at NSA. W 

Echoing the recommendations of the Hoover Commission, Baker felt that pure 
cryptanaly tie research should be removed outside NSA, to a Los Alamos-style institute. 
This would isolate pure research from a production organization and reduce the 
temptation to employ the best minds in the day-to-day tasks of getting out the news. 15 



(t>) (i) 

(b) (3)-50 USC 403 
(b! (3)-18 USC 79B 
(b) (3)-P.L. 66-36 



HANDLE VIA TALENT KEYHOLE COMNT CONTROL 3Y3TEM0 JOINTLY 



257 




DOCID: 3188691 



(b) (3)-P.L. 86-36 



IOMKRETuyrBRA 

As for the cryptologic system in general, it should be further centralized under INSA. 
Only by centralization could anyone integrate all the pieces of the puzzle and move the 
organizations involved in the same direction. Baker took dead aim at the AFSS processing 
center in San Antonio (AFSCC), which he singled out as an unwarranted duplicative 
processing facility. In fact, the entire collection and processing system should be 
overhauled under NSA's direction. Some field processing should be transferred to NSA, 
and the Agency should direct the services to close down redundant collection. NSA should 
centralize theater processing centers under its own jurisdiction. Better communications 
and machine processing systems could speed the flow of intercepted materials thrdugh 
those centers, and information would be distributed more quickly to customers. Moneys 
saved from the rationalization of the entire process could be applied to other parts of jthe 
system. 18 j 

Certain specific field operations should be improved under NSA leadership. For 
instance, analog signals should be converted to digital form for processing; the technology 
was already available. NSA should develop improved intercept and recording equipment 
and make them standard throughout the cryptologic system. Punched paper tape, used 
universally throughout the system, should be phased out in favor of magnetic tape. 17 

Finally, the two related disciplines of COMINT and ELINT should be combined under 
NSA direction. This was the ultimate rationalization of the system and was, according ito 
Baker, long overdue. This generated controversy even at the White House. Deputy 
Secretary of Defense Donald Quarles said that ELINT had only recently been centralized 
under the Air Force, and he appealed for time to make it work. But Quarles was losing; it 
was the clear consensus of the meeting with Eisenhower that ELINT would ultimately be 
placed under NSA. 18 I 

Baker's recommendation regarding a Los Alamos-style research institute melt 
substantial skepticism. Some (like CIA) felt that it wasn't necessary. Edward Lansdale 1 , 
deputy assistant to the secretary of defense for special operations, pointed out that success 
on high-level systems often stemmed from working medium-grade codes from the same 
country. Physically and organizationally separating cryptanalysts working those systems, 
from those working high-grade systems would be technically unsound. Moreover, NSA! 
would likely face severe morale problems if part of its mission were to migrate to a! 
separate research institute led by higher-paid private consultants. 



HANDLE VTA TALENT KEYHOLE COMINT CONTROL QYSTEMQ JOINTLY 

MfYT- RRT A A F T TH 1?ni l fiMHI T hJI , VMV > 



UMBR/ 



TOP SECRET UMBRA 258 



(b) (1) 

(b)(3)-P.L. 86-36 .-/(b) (3)-P.L. 86-36 

(b) (3)-50 USC 403 -v;5 



DOCID: 3188691 (b) (3)-18 USC 798 it 



But the proposal that generated the most heat (although not the most/light) was the 
BLINT proposal. The Air Force and Navy adamantly opposed it; CtA was standoffish. Even 
the director of NSA did not want the job unless he got with it a substantial grant of 
authority. The Navy called the treatment of ELINT "superficial"; the report buffered "from 
a lack of balance." USCIB was not surt what to do, and it played for time by establishing i . 
task force to study the issue. 20 



The Reuben Robertson Report \ 

.V / / 

The second look at NSA stemmed from budgetary pressures. Eisenhower had for years 
been in a running battle with the Democrat-coiitrolled Congress/over the defense budget, 
and in 1957 Secretary of Defense Charles Wilsoft was looking for excess money anywhere 
he could find it. It occurred to him that he might find it in NSA's budget, and in January of 
1957 he directed Deputy Secretary of Defense Reuben/Robertson (a different Robertson 
than the H. P. Robertson, who had chaired a committee in 1953; see p. 227) to establish an 
ad hoc committee to look at the CQfeJT and COMSE& budget s. He told Robertson that his 
objective would be to hold cryptology undei a Iper year. Robertson chose to 
chair the committee himself, and on it he placed a\ number of under secretaries and 
assistant secretaries. It was very high-powered indeed;? 1 



Robertson zeroed in oti the 



bottom, line but couldn't find it. The 
cryptologic budgeting process, spread across the Defense Department, was a mess. He 
finally concluded that wjiat the department really spent bn cryptology was closer 



]and he determined to try to hold that bottom line. But he found even that goal 



to!" 

iat" 



hard to reach. The reason was that cryptology was havin g an unexpectedly high pa yoff. 



came 



Robertson found that much of what the United States knew 
from COMINT. He tried to effect economies, but it was unrealistic to attempt any rigid focus 
on! U 



HANDLE VIA TALENT KEYHOLE OOMIHT OONTROL EYPTEMP JOINTLY 

MAT T^T,| .1? AS ART .f T" """""" » T » ™™ r ' r °- 



259 TOMCr^ETUjyr^RA 



DOCID: 



3188691 

TQB-SECffET UJ/hIrA 



...-S?(b) (1) 

(b) (3) -50 USC 403 
7 / i (b) (3J-P.L. 66-36 



When the committee first began, it took a very close look at collection; This, it figure^, 
was wh ere most duplication occ urred. It . recommended that ..total collection sites 



be 

reduced | The economies thus effected would result in/ a ndi 

increase in total numbers of positions; the new positions would be financed/by the station 
closures. This would scuttle plans for a continued major expansion of collection resources 
but would not really diminish the size of the system. 2 ? 

What the committee came to understand, in.the end, ytes that apparent duplication ofi 
targets and positions was usually not actual duplica tion. I / / |j| 

/ / Only / { cases were being copied phi 

more than 1 position, and in most cases. there was\ sound rationale for the duplication!;! 
What had appeared so simple at Wilson's level did not jook at all siinple up close.f | i 

Instead, the committee worked on station consolidations 
Navy, and Air Force stations 
similar situation 
and 



Virtually collocated Army I 
should be combined; with AFSS hosting. j a| 
[should be resolved in the same v fray, with the ArMy as hojstli 
with the Navy as host! 



They noted with approval Air Force plans to close U 
and centralize the resources! 



[They especially lik ed 



collection real estate and recommended that the AFSS site at 
But most of these consolidations were already in the planning stages ■ 
gave them a shove. 



as 



be enlarged/ 5 
Robertson simply 



The lasting contribution of the Robertson committee was in the budgetary mechanism 
itself. Robertson was a big advocate of centralization, and he wanted increased NSA 
control over the process. But he was frustrated by the difficulty of determining what the 
actual cryptologic dollar figure was. He dealt with cryptologic budgets from all tbiee 
services, as well as NSA (and to a lesser extent CIA). He believed that^his should alljbe 
rationalized somehow. So he recommended that all cryptologic budgeting be centralized 
under DIRNSA. It would be called the Consolidated Cryptologic Program (CCP). 26 The 
recommendation was acted on almost immediately, and fiscal year 1959 w^s set for jthe 
implementation target date. 27 



The Marriage of eunt and NSA j _ ' 

When a matter gets to the Oval Office, it can no longer be ignored. The inarriage 
(some say an unhappy marriage) of NSA and ELI NT began at last, following I the 
recommendations of Baker to President Eisenhower. This forced a reluctant and disunited 
USCIB to further consider what it had already considered many times. USCIB appointed 



(b) (1) 

(b) (3) -50 USC 403 
(b) (3) -16 USC 796 
(b) (3J-P.L. 66-36 



HANDLE VIA TALENT KEYHOLE OOMINT CONTIIOL OYGTEMP JOINTLY 

NOTRF;r, F;A°rt PT F" r ^r"nr rr i?T' l i ' i' '"ii 1 " 1 




260 



3188691 



the CIA representative. So as to 
direction the decision was to go, Louis Tordella of NSA was 



a special study group under 
leave no doubt about which 
made the deputy chairman. 

Overriding strenuous objections by the Air Force, ] fr pted for a consolidated 

ELINT system under NSA. His report to USCIB in June of 1958 recommended that the 
NSC "appoint the secretary of defense as the oxecutive agent of the government for ELINT 
and assign the Director, National Security Agency, the authority and responsibility for 
providing an effective, unified organization to control and direct the ELINT intercept, 
processing, and reporting activities of the United States Government." A new directive, 
NSCID 6, would replaceNSCID 9 and would encompass both COMINT and ELINT. 28 

NSCID 6 appeared to give NSA the cryptologic authorities it had been asking for. 
When the secretary of defense published the DoD implementing directives for COMINT and 
ELINT, however, they came out very differently. The COMINT directive gave DIRNSA 
operational and technical control of all U.S. COMINT operations except for a very restricted 
list of SlGlNT-related operations not directly related to intelligence gathering (such as 
search and rescue and various electronic warfare operations). The ELINT directive, 
however, reserved this right to the secretary of defense himself. Only he had the authority 
to "determine the ELINT activities which are essential to provide support to commanders 
who plan and conduct military operations, and which must be directly assigned by the 
secretary of defense to provide an integral ELINT capability " 

The services interpreted this to mean almost any type of ELINT collection or processing 
operation. General Samford told his immediate boss, General Erskine, that he assumed 
that the only ELINT collection that he actually controlled now was that being done by the 
SGAs. His assumption was correct. 29 

At first NSA did not know quite how to organize the new mission. The key issue 
revolved around the competing desires to combine ELINT and COMINT on the one hand and 
to maintain a separate identity for the new discipline on the other. But ELINT arrived with 
old baggage - the central processing center, NTPC - and so the forces advocating a 
separate identity won a partial victory. After some indecision, it was decided to graft it 
onto an existing organization, and ELINT first landed in the Office of Collection within 
PROD. The name of the office was changed to COSA (Collection and Signals Analysis). It 
was a temporary way station oh the way to its own home, W Group, established in 1968. 30 

NTPC thus became the first clearly identifiable ELINT asset at NSA. When NSCID 6 
was promulgated, it was decided to transfer the entire resources of the organ izatio n - the 
people, the equipment, the files - to NSA. T his amo unted to something ove r| | people, 
split rather evenly among the 3 services and | | and the equipment for third-echelon 
processing. 31 



HANDLE VIA TALENT KEYHOLE COMINTCONTJUMrS¥STEMS JOINTLY 
NOT RELEASABI^flOTTj^ETG^JNATIONALS 



261 



TOP SEC&ET-tflMBRA 



DOCID: 3188691 



TQE£E€RETtnttBRA 

Along with elint came signal search. CIA and NSA had competed for the mission of 
spectrum search and signal cataloguing since 1953, but in the long run the CIA effort was 
unsupportable. The basic CIA SIGINT effort was too small to give it an adequate technical 
base for the search mission, and, anyway, it was as clearly a cryptologic mission as could 
well be imagined. NSCID 6 was the last straw, and in the summer of 1959 CIA gave up its 
effort. COSA, which under its previous incarnations had always had a signal search 
organization, lost a competitor (without, in this case, picking up assets). 32 

Telemetry was another new arrival. Telemetry had always been handled as elint. 
The services, heavily reinforced by private contractors like HRB-Singer, General Electric, 
Jet Propulsion Laboratories, and Lockheed, all had telemetry collection and analysis 
efforts. Beyond that, CIA had an effort of its own, emphasizing (as did its ELINT mission) 
the cutting edge of technology. Third-echelon telemetry analysis had been concentrated at 
NTPC, but contractors still performed the major share of fine-grain analysis. 38 

There was considerable discussion over the nature of telemetry. Was it really COMINT, 
as NSA contended, or really ELINT? Melville Boucher, an NSA telemetry analyst, once 
said that "telemetry has always been a gray area surrounded by fuzz seen through a thick 
mist." The answer would determine how telemetry reports would be handled - spread far 
and wide as straight-secret ELINT reports or bottled up by COMINT codewords. In the 
summer of 1959, coincident with the transfer of ELINT assets to NSA, the ELINT committee 
of USIB (renamed from USCIB by the publication of NSCID 6) decided, rather predictably, 
that telemetry was really ELINT and that it would go forth without hampering codewords. 
But that did not change its resubordination. The telemetry mission migrated to NSA 
where it eventually became TELINT and later FISINT. 84 

Since NSA had no telemetry analysts, it would need help. ASA came First, agreeing to 
transfer its telemetry assets, including its contracts with JPL and HRB-Singer, to NSA. 
NSA established its first telemetry analysis effort under Joseph Burke, who became 
known as the father of NSA telemetry. 

The transition from Air Force to NSA telemetry was more difficult. The Air Force 
retained a residual telemetry effort and resisted turning over its telemetry mission to NSA 
for months. In the end they did so only through the considerable persuasive powers of 
General Samford. 35 

Once NSA took over telemetry, it found out just how chaotic the situation was. Each 
organization involved had its own equipment and used its own set of collection and 
processing standards. Telemetry tapes arrived at NSA in a hodgepodge of formats, and at 
first it was difficult to simply collect information on the formats involved. 36 To bring order 




DOCID: 3188691 



TOP 



BRA 



(b) (1) 

(b) (3J-50 USC 403 
(b) (31-P.L. 86-36 



to the chaos, Louis Tordella, in the spring of 1960. crea ted 



' it became a clearinghouse for 

technical information, and it marked NSA's first big initiative in consolidating the effort. 37 

NSCID 6 did not solve the problems that had plagued ELINT. Within two years, the 
President's Foreign Intelligence Advisory Board (PFIAB) was already complaining that 
NSA had been given too meagre a grant of power. 38 It did eventually result in 
standardized technical rules and procedures, and in that sense the EUNT experiment of 
1958 became a success. In the area of command and control, however, it was a dismal 
failure. 



The Kirkpatrick Committee 



The tireless process of reviewing intelligence functions continued to the end of the 
Eisenhower administration. The last player in the game was the Kirkpatrick Committee. 
Chaired by Lyman Kirkpatrick of CIA, its purpose was to assess all defense intelligence 
programs, including SIG1NT (a term that came into the language after NSCID 6 was inked). 

Kirkpatrick, like the CIA whence 
he came, was distressed at the 
uncoordinated and duplicative nature 
of defense intelligence. Centralization 
was the only way to rationalize the 
system, and in SIGINT that meant more 
power to NSA. ELINT was out of control 
(an old refrain), and the decentralizing 
tendencies of the Unified and Specified 
Commands had to thwarted. 
Moreover, comint and elint had not 
been fused, as Baker had envisioned. 
This was due in some degree to 
classification differences and the 
tendency of COMINT people to shield 
their information from many of the 
people who really needed it. 39 




Lyman Kirkpatrick 



HANDLE VIA TALENT KEYHOLE COMIMXOJiXSeirS'YSTEMS JOINTLY 
NOT REiJlASASHrTOT?5TtEIGN NATIONALS 



263 



DOCID: 3188691 



TOP 



(b) (1) 

(b) (3)-P.L. 86-36 
jb) (3)~50 USC 403 
(b) (3)-18 USC 798 



Two of Kirkpatrick's recommendations would have a long-range inipact on 
intelligence. First, he recommended that an "intelligence community sjtaff be 
established, responsive to the DCI. Second, and much more specifically germatU to the 
SIGINT world, he called for a broader use of COMINT. The committee viewed the SSd system 
as having devolved into an obstructionist group that held information too closely and kept 
key players out of the inner circle. According to Kirkpatrick, the SSO system should "be 
staffed by personnel of rank commensurate with a courier function" and "avoid placing 
their own interpretation on material transmitted by the Special Security Officer Sysjtem." 

If true, the charges indicted a system which had been quite dynamic during World War 
II. The Kirkpatrick report marked the beginning of the end of that era of dynamism. He 
offered no prescription for the problem of interpreting SIGINT. 40 But the very ne*t year 
NSA came up with the solution with the creation of a fledgling Cryptologic Support broup 
(CSG) system. I 



NSA Centralizes the Field System 



Cryptologic centralization was having a profound effect on the field system. SonU of 
this proceeded from the new authorities that NSA was gaining and from the new 
responsibilities that it was undertaking. I 

Much of it, however, emanated from a different source. In 1958 Eisenhower iiad 
succeeded in getting a sweeping Defense Reorganization Act through Congress. It took jfche 
JCS out of the direct chain of command and made them advisors and planners. Within the 
command structure, it created the Unified and Specified Commands. This marked a sea 
change in the way America did its fighting. Henceforth, wars would always be fought with 
combined commands, with component service forces integrated under a single military 
boss, the commander of the relevant unified command. 41 i 

Overseas, this reorganization demanded major changes in the way cryptology was 
organized. Now it was more important to render cryptologic support to the unified 
commander. The SCA theater headquarters, representing as they did only the cryptologiq 
assets of a single service, were incapable of doing it. Only the NSA field organization 
could. | 

The first theater to change was Europe. NSAEUR, which had been established in; 
Frankfurt, had exercised only a technical support role within the cryptologic community.! 
But as early as 1955, an experience d NSAEUR analyst was sent to join the CINCEUR staff ! 
at Camp des Loges, outside Paris. 



^2 * 




DOCID: 3188691 



In that year, NSAEUR, over the strenuous objections of ASAEUR, gave its small staff 
at Camp des Loges augmented authority to represent the cryptologic community to 
CINCEUR. The new functions involved theater-wide planning and representation, and 
they marked the first time that the field offices had strayed far beyond technical functions. 
NSAEUR continued to augment the staff in Paris and in 1963 moved its office there, 
leaving behind in Frankfurt the technical support staff to deal with internal cryptologic 
issues. Included in the 1963 move was a new organization, NSA Europe Intelligence 
Support Section (NSAEUR/ISS), an element that had been set up to interpret SIGINT 
product. It was the first Cryptologic Support Group (CSG.) 43 

AFSS and the Development of Second-Echelon Reporting 

A parallel development produced profound changes in theater reporting. Ultimately, 
it was to lead to the revolution in SIGINT reporting which res ulted in the creation of th e 
National SIGINT Operations Center ( NSOC). It started with the 



AFSS understood at its birth that airplanes move faster than almost anything and 
that to conduct a COMINT support function for the Air Force, it would have to create an 
extremely rapid reporting system. At first this led to negotiations with Canine over field 



would 



site reporting authorities. But AFSS had bigger plans. Keeping track 
involve networking all its theater collection sites, and this would require the creation of a 



The plans for this were on the 



theater-level center. 

drawing board even before the demise of AFSA. 4 * 

NSA and AFSS went back arid forth during the early 1950s over what organization 
should handle this responsibility and where itshould be located. By 1955, however, they 
had resolved their differences. 



The 



as it was called, would have 



considerable power. It would "direct the intercept and analysis of foreign 
cott imunicatibns" and would "exercise rou tine operational control . . . of all COMINT, ELINT, 
and matters. . . ." It would collect traffic forwarded 



from field sites under its control and would forward raw and semiprocessed traffic back to 
the States. It also had its own independent reporting authority. 46 



(b) (1) 

(b) (3)-P.l, 6S-3S 
(b) (3)-50 USC 403 
(b) (3J-1B USC 798 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 3Y3TBMQ JOINTLY 
NOT ItELEABADLE TO FOREIGN NATIONALS 




DOCID: 3188691 



tq&secRetu^(bra 



(b> (1) 

(b) (3)-50 USC 403 
(b) (3J-P.L. 86-36 



This was not unique. ASAEU R exercised similar responsibilities at its processing 

differed by the way that it evolved. A key figure in the 



center 
evolution 



on ofl 



was a young Air Force captain named Benjamin Ardisana. 




4 



. j., r- > f 

Benjamin Ardisana shown as a lieutenant, with his wife Betty, in the early 1950s 



Ardisana had'begun his service career in the Army Signal Corps during World War II. 
He had entered the .cryptologic business in 1952, and after a series of assignments with 
AFSS units in the Fat East, where he had shown an exceptional talent for innovation and 
initiative, he arrived ir n July 1958. 47 



Less than a, year later (May 1959), Ardisana s et up the first Eur opean field Opscomm 



circuit, between 



to coordinate the 



between the two organizations. (Some claim that this was the first upscomm in the/ 
community; the strength of that claim rests on the date that SMAC first set one up, a date 
which is less well documented.) At the same time, Ardisana established an around-the- 
clock surveillance and warning center to watch the 
reported from subordinate sites. 48 



as it was being 



(b) (1) 

(b) (3J-P.L. 86-36 
(b) (3)-50 USC 403 
(b) (3)-18 USC 798 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 3Y3TEM3 JOINTLY 
lO&SECRETUj^tfRA 266 



DOCID: 3188691 



(b) (1) 

(b) (3J-50 USC 403 
(b) (3)-18 USC 798 
(b) (3)-P.L. 86-36 




DOCID: 3188691 



(b) (1) 



(b) (3)-P.L. 86-36 
(b) (3)-50 USC 403 
(b) [3)-lB USC 79S 



- TOP SCCftCTU MBRA 




All this emanated from four massive stone buildings left over from World War II. "The 
reporting operation was on the fourth floor of one of them, under the very eaves of the 
building, in a room filled with up to twenty-six Opscomm machines (Teletype Mod 19s and 



The Struggle for Control in the Pacific 

The Pacific theater was very different from Europe, and it developed in a very different 
way. Unimaginably huge and far-flung, it was made to order for fragmentation. In World 
War II it suffered from two different and competing commands employing different lines of 
attack - MacArthur in the southwest and Nimitz in Hawaii. Supporting each was a 
separate and unique cryptologic system. When, in 1945, the two commanders went into 
garrison, their cryptologic organizations followed them. 

In Japan, MacArthur's cryptologists centered on Tokyo. NSA Far East (NSAFE), the 
cryptologic flagship in the Pacific, eventually came to be located on Pershing Heights in 
downtown Tokyo. ASAPAC and 6920th SG, the ASA and AFSS senior representatives in 
theater, were also posted to the Tokyo environs. Among them they controlled most of the 
Army and Air Force cryptologic assets in the theater. 

Supporting Nimitz was NSAPAC. But the offices in Hawaii were just that - offices 
without dynamic functions. NSAFE had garnered alLNSA's technical expertise in the 
theater. This was an accident of history, which resulted from the collapse of the Civop 
program in the mid-1950s. The program had been roundly disliked by the SCAs, but it did 
provide highly skilled civilian talent that they found most useful. Thus an organization 
which became known as PACEXFAC (Pacific Experimental Facility) developed as part of 
the NSAFE staff in Tokyo, and it absorbed most of the billets. Like NSAEUR Office 
Germany in Frankfurt, PACEXFAC was the cryptologic troubleshooter for the Pacific. It 
reinforced the real utility of the Tokyo office. 52 

In 1957, Samford decided to rename the offices, but he kept the pecking order the 
same. NSAFE was renamed NSAPAC, but the office in Hawaii was called NSAPAC 
(Rear), as if it were a skiff being towed by a battleship. It was a name that grated. 53 

This was how NSA was organized in the Pacific when the Unified and Specified 
Commands were created in 1958. Under the new scheme, CINCPAC in Hawaii was 
clearly the senior commander in the theater. When Samford's immediate superior, 
General Erskine, came through on a trip the following year, however, he was surprised to 
see that NSA had not changed to conform to the realities of the new military command 
structure. NSAPAC (Rear) was still in Hawaii, and its chief was the deputy to NSAPAC 



28s) all clattering away together. 



HANDLE VIA TALENT KEYHOLE OOMINT CONTROL 3Y3TEM0 JOINTLY 
NOT RELEASADLE TO FOREIGN NATIONALS 




268 



DOCID: 3188691 



(b) (3)-P.L. 86-36 



- top sccnnu wiBRA 



in Tokyo. He returned to Washington coiriplaining that NSA had it all wrong in the 
Pacific. 54 

This unusual organizational scheme bumped along until a hew director, Admiral 
Frost, toured the Pacific in the spring of 1962. Frost talked it over with the current 
CINCPAC, Admiral Harry Felt. When he returned to'-NSA, he decreed that NSAPAC 



would henceforth be located in Hawaii to support CINCPAf 



Samford Joins the Agency 

The Canine era came to an end on 
23 November 1956. His replacement 
was Lieutenant General John A. 
"Sammy" Samford. As mellow as 
Canine was forthright, Samford came 
to NSA to smooth ruffled feathers and 
give the Agency some room to breathe. 
Canine's five years (including one year 
as director of AFSA) had been a hectic 
time. 

Samford was actually better 
prepared for the job than Canine had 
been. He came to NSA from the 
Pentagon, where he had been chief of 
Air Force intelligence, and served a 
grooming period of six months as 
Canine's vice-director. When he 
became DIRNSA, he already knew the 
players. 




John Samford, second director of NSA 



His style was fluid - Samford was as smooth as silk. A CIA official described him as 
"more of a pedant than a pilot, more of a philosopher than a fighter, ... a man who 
understood and loved the SIGINT business." 58 He set out to calm the waters between CIA 
and NSA, and when he left the job in I960, the two organizations were back on speaking 
terms. His relations with USAFSS, contentious under Canine, settled back down. 
Samford had developed a close personal relationship with Gordon Blake, who became 
commander of USAFSS in 1957, based on old-school ties established when they had both 



HANDLE VIA TALENT KEYHOLE COMINT CON T ROL SYSTEMS JOINTLY 
NOT RELEAOADLE TO FOREIGN NATIONALS) 

269 JQI*«€RmjiyrtiRA 



DOCID: 3188691 



JOPSCCRE' njyeRA 

been cadets at West Point. They both knew that the independence of AFSCC would have 
to end, but with as little bloodshed as possible. 

In order to enshrine the new era of good feelings, Samford initiated a novel experiment 
in 1958, in which the chief of the Soviet Navy shop (GENS-2), a Navy captain, would 
actually work for the director of naval security, while continuing to respond to DIRNSA on 
operational matters. The next year he extended this unique arrangement to the Air Force 
and Army, resubordinating the chiefs of GENS-1 and GENS-3 to their parent SCA 
commanders. The idea was to give each SCA a stake in NSA, but it did not last long. 
Seeing that it had failed to sublimate service factionalism (and even in some cases making 
it worse), Frost scuttled the system in 1962. 57 

Samford also moved quickly to resolve a long-standing dispute between Canine and 
Deputy Secretary of Defense Reuben Robertson. The 1956 McKinsey Study recommended 
that NSA be run more on private business principles. To instill a sense of corporate 
management, the director should appoint a civilian deputy from the business community. 
But Canine, having called in the McKinsey group, rejected the recommendation. Instead, 
he continued with his system of elevating one of his service deputies to a position called the 
vice-directorship, and he continued to act as his own de facto deputy. The dispute between 
Canine, who opted strongly for military management, and Robertson, who demanded a 
business approach, grew acrimonious and soured Canine's last months in office. 

Samford found, on being elevated to the directorship, that Robertson already had 
someone in mind. That someone was Joseph H. Ream, a top CBS executive. So, only some 
two months into office, Samford named Ream to the new job of deputy director, just to give 
the idea a whirl. 

It soon whirled into oblivion. Ream had no SIGINT background, and the learning curve 
was too steep. He had serious family problems that required extended trips to Florida and 
that cut into his learning time. His lack of technical qualifications for the job simply could 
not overcome his well-documented managerial skills. Further, he found it hard to deal 
with an entrenched bureaucracy that viewed him as an outsider. Ream quit in frustration 
only six months into the job. It was the last time anyone successfully imposed a 
nongovernment outsider on NSA's top-level management structure. 58 

In his place, Samford hired Howard Engstrom. Engstrom's impact on cryptology had 
already been considerable. He was brought into the Navy from the Yale math department 
during World War II. He quickly became influential in the development of computers for 
cryptologic work, and when the war ended, he left the Navy to form Electronic Research 
Associates (ERA), where he was the guiding genius in the effort to develop computers for 
NSG, AFSA, and later NSA. In the mid-50s he left Remington Rand (which had 
swallowed ERA), where he was a vice-president, to join NSA's R&D organization. When 
he arrived at NSA, Samford elevated Engstrom to the position of associate director, which 
gave him and his R&D organization special status and was designed to answer DoD-level 



IIAITOLE VTA TALENT KEYHOLE OOMIlfT OOIfTROL 0Y3TEM3 JOIMTLY 
NOT RKI.EASABLE TO FOREIGN NATIONALS 



TOP SECRET U iyH^RA 270 



DOCID: 3188691 




concerns that NSA was not doing enough in research and development. When Ream quit, 
Samford moved Engstrom to the post. But he remained only a year, and in August of 1958 
NSA experienced yet another change in the revolving door position of deputy director. 59 

The TordeUa Era Begins 

In late July of 1958, Samford 
summoned Louis Tordella, NSA's 
influential representative at Office of 
Special Operations (0S0), to his office 
to talk. Tordella remembers a short 
chat about inconsequential matters, 
following which Samford asked 
Tordella what a deputy director should 
be. Tordella told the director that the 
deputy should be his "alter ego." That 
sounded good to Samford, and he 
offered Tordella the job on the spot. It 
was the last time any director would 
have to do that for sixteen years. The 
revolving door shut with a bang behind 
the lanky form of Louis Tordella. 60 

Like Engstrom, Tordella had been plucked from a college math department for Navy 
service in World War II. Originally a Hoosier, he had gone to school in Illinois. OP-20-G's 
Laurance Safford found him on the campus of Chicago's Loyola University through his 
unique program of recruiting academics with an expressed interest in cryptology. And 
also like Engstrom, he was, in 1958, already a cryptologic legend. Tordella had pioneered 
in so many areas of Navy cryptology that he was close to being a universal man, like the 
Army's Frank Rowlett. He joined NSA when it opened its doors and served in numerous 
key positions which permitted him to push his favorite projects, especially the application 
of computers to cryptanalysis. Tordella had been NSA's representative on numerous high- 
level committees. This, and his tour in the Pentagon, had given him the opportunity to get 
acquainted with just about everyone who counted, and when Samford proposed his name to 
Deputy Secretary of Defense Donald Quarles (who had replaced Reuben Robertson) in 
1958, he got no opposition. 61 



HANDLE VIA TALENT KEYHOLE GOMINT CONTROL 3Y3TEM3 JOINTLY 





DOCID: 3188691 



I0B4ECREfuW(BRA 



Tordella did indeed become the director's alter ego. Staying through the tenure of 
seven directors, he was the details man, the continuity. To many inside and outside the 
Agency, Louis Tordella was NSA. 

Public Law 86-36 

In 1959 Congress passed Public Law (PL) 86-36, which contained provisions 
permitting NSA to separate its personnel system from the regular Civil Service system, a 
permission which CIA had had since its inception. The problem that NSA had faced was 
that it had never been created by statute (only by executive order, the now-famous 
Truman Memorandum). There was thus no law which could keep NSA's personnel system 
apart from that of the rest of the federal government. Civil Service regulations straight- 
jacketed NSA procedures, and classification hampered NSA adherence to procedures 
which were intended for a completely open system. To eliminate the dilemma, PL 86-36 
exempted NSA from the laws relating to the classification and grading of civilian positions 
from disclosing any information regarding the number of employees, the names, titles, or 
Job descriptions. Public Law 86-36 was to have a major impact on NSA policies in both the 
personnel and security areas. 62 



NSA AND THE AMERICAN PUBLIC -THE ISSUE OF LEGALITY 

No person not being authorized by the sender shall intercept any communication and divulge or 
publish the existence, contents, substance, purport, effect, or meaning of such intercepted 
communication to any person. . . . 



Cryptologic activities, which in the United States began during the early years of 
World War I, occupied an uncertain place in government. Early American cryptologists 
worked without the knowledge of the American public. They even worked without 
knowing if what they were doing was legal or not. It was an odd and unsettling position to 
be in. 

Early statutes affecting cryptology were devised by Congress to protect radio, a new 
invention which required protection. Thus it was that a series of acts, beginning with one 
in 1912, was passed to protect information in radio messages from being passed to a third 
party to be used for commercial gain. This appeared to have a benign effect on cryptologic 
activities in the Army and Navy until 1927, when a revised statute stated that "no person 
not being authorized by the sender shall intercept any message and divulge or publish the 
contents, substance, purport, effect, or meaning of such intercepted message to any person. 
..." The aim of the legislation was the same as that of earlier statutes - to protect the 
information "unless legally required to do so by a court of competent jurisdiction or other 



Federal Communications Act of 1934 



HANDLE VIATALBHT KEYHOLE COMINT CONTROL SYSTEMS JOINTLY 
NOT RKl EASADLE TO FOIIEIQH NATIONALS 




272 



DOCID: 3188691 



I0B£ECffETuySRA 

competent authority. . . ." Other competent authority could be the president or someone in 
the Army or Navy chain of command. But as the word "intercept" had crept into the 
statute, for the cryptologists who secretly plied their trade, this was unnerving news. It 
implied that what they were doing might be illegal. Further, it had the effect of shutting 
off liaison with the telegraph cable companies, who had in the early years supplied most of 
the material that the Army worked on. (But by the late 1920s the Army, like the Navy 
before it, was beginning to set up its own intercept stations.) 63 

Meanwhile, the American public was blissfully unaware of any cryptologic activity at 
all - unaware, that is, until the publication of Yardle/s The American Black Chamber in 
1931. Worse, Yardley was hard at work on a sequel, to be called "Japanese Diplomatic 
Secrets." It was never published - it became, in fact, the first publication ever suppressed 
in the United States on the grounds of national security. To prevent any other revelations, 
Congress in 1933 hurried through a bill that prohibited all government employees from 
revealing their knowledge of American codes "or any matter which was obtained while in 
the process of transmission between any foreign government and its diplomatic mission in 
the United States." The penalty would be a $10,000 fine or ten years imprisonment, 
considered to be a heavy enough hammer in those days. This appeared to be a backhanded 
way of authorizing other black chambers. If such activity were illegal, then why protect 
its activities from disclosure? 6 * 

This step forward was followed immediately by disappointment. When the Federal 
Communications Act was passed the following year, it contained the same clause 
regarding "intercept." There was a good deal of discussion about this within SIS and OP- 
20-G. Legal minds pointed out that the statute prohibited intercept "and divulging" of 
such communications. If it had said "or divulging," it would clearly have singled out the 
process of intercept as illegal. But the intercept activity would not be illegal unless it were 
accompanied by "divulging," which, once again, referred to use of the information for 
commercial gain. And the so-called Yardley Act the year before seemed to imply legality. 
But there was a lingering suspicion that they might someday be prosecuted for what they 
were doing on the basis of Section 605 of the Federal Communications Act of 1934. The 
penalties were exactly the same as they were under the Yardley Act. 65 

Following the 1945 Pearl Harbor hearings, which amounted to the second public 
revelation of cryptologic activities, there were loud demands for legislation protecting this 
vital activity. Within the Army and Navy themselves, lawyers drafted protective 
statutes, and the Truman administration moved toward the introduction of legislation. 
Finally, in 1949 a draft was ready, and it was steered through the Senate by Lyndon 
Baines Johnson, a young senator from Texas. In 1950 the bill became law: Title 18, 
U.S.C.798. 66 



HANDLE VIA TALEMT KEYHOLE COMINT C O NTROL SYSTEMS JOINTLY 

MOT RELEAGADLE TO FOREIGN NA HON ALB 




DOCID: 3188691 




RA 



The United States already had legislation. But the Espionage Act of 1917 required 
proof that the person revealing the secret information intended to injure the United 
States. The courts had required a high standard of proof, including the direct involvement 
of agents of a wartime enemy, in order to secure a conviction. What if no enemy agents 
were involved? Or what if the agents were from a "friendly" country? Or what if the 
person simply gave the information to a reporter who published it? 

Title 18 took care of all that. It made it a crime to divulge information relating to 
various aspects of cryptologic activities to an unauthorized person "or uses in any manner 
prejudicial to the safety or interest of the United States or for the benefit of any foreign 

government " It cast a very broad net, was almost totally inclusive, and was legally 

enforceable even in the absence of intent to injure. It could thus deter, or be used against, 
well-meaning but misguided idealists. 67 

Just as important, it implicitly authorized COMINT activities by acknowledging that 
they were going on and by protecting their secrecy by law. Here was an implicit voiding of 
Section 605 of the Federal Communications Act of 1934 and earlier statutes as they 
related to cryptology. 

This was followed two years later by the Truman Memorandum creating NSA and 
describing its responsibilities. Here was the "lawful authority," even though classified, so 
needed in the years prior to the war. As the years rolled on and Congress appropriated 
money for NSA's activities, the legal status of the business became less and less debatable. 
The 1959 anonymity statute (Public Law 86-36) for the first time named NSA in 
legislation. Finally, in 1968 the Omnibus Crime Control and Safe Streets Act specifically 
overruled Section 605 of the Federal Communications Act of 1934. Cryptology had made 
the journey from a secret black chamber to an officially authorized and avowed 
government activity. 68 



PUBLIC REVELATIONS AND CRYPTOLOGIC SECRECY 

[It is] of the essence of a secret service that it must be secret, and if you once began disclosure, it is 
perfectly obvious that there is no longer any secret service and that you must do without it 



Following Yardley, COMINT went underground. The Black Chamber had already been 
destroyed by Secretary of War Stimson in 1929 (through the device of pulling State 
Department funding). Its successor, Friedman's SIS, was so small (he started with a staff 
of six) as to be effectively invisible. The Navy had an effort of comparable size, and the 
entire enterprise proceeded reasonably secure from the eyes of the public. 



Austen Chamberlain, British foreign secretary in the 1 920s 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL OYOTEMQ JOINTLY 
WOT ItELEASABLE TO FOItEIQN NATIONALG 




274 



3188691 



iomeckeTuMbra 



Beginning in 1939, a series of magazine and newspaper articles trumpeted the success 
of the federal government in breaking up German espionage rings. Some of the articles 
referenced German codes and discussed U.S. intercept activities. SIS and OP-20-G 
officials were livid - someone was calling attention to COMINT activities in such a way that 
the Germans could be alerted and might take countermeasures. 

The "someone" turned out to be the Federal Communications Commission (FCC). FCC 
revelations to the press, designed to boost its stock with the public, were at least partly 
responsible for the War Department's securing Roosevelt's order in 1942 directing that 
such activities be discontinued in all but the Army, Navy, and FBI. Despite the order, the 
FCC continued its radio monitoring and codebreaking activities throughout the war and 
even accompanied this with leaks to the press boasting of its COMINT effectiveness. 89 

Potentially more damaging was an article in the Chicago Tribune immediately after 
the Battle of Midway alleging that the U.S. had had advance knowledge of Japanese plans. 
The article was bylined by Stanley Johnston, a reporter who had been with the Pacific 
Fleet during the battle of Coral Sea. The next month columnist and broadcaster Walter 
Winchell stated that this knowledge had come from the breaking of Japanese naval codes. 
The Navy demanded that Johnson be indicted, and the case went to a federal grand jury in 
Chicago in August. No indictment resulted, a blessing for an over-eager Navy legal 
department that would have had to reveal far more damaging information in court to 
secure a conviction. The glare of national publicity was mercifully diverted, but in 
August, far ahead of schedule, the Japanese Navy changed all its codes. (There was never 
any direct evidence, however, that the Japanese read the Tribune or changed their codes 
in response.) 70 

Classifying Cryptologic Information 

Service cryptologists were almost instinctively aware of the extreme sensitivity of 
their work. They began in such small organizations, though, that the process itself was 
easy to protect. Once they developed information that needed to go to someone, they 
generally distributed it on a by-name basis to those few Army, Navy, and State 
Department people who had an absolute need to know. Information was often taken in 
locked containers, and a courier stood by while the official involved read and initialed the 
paper. 

As for a formal classification, they had to use what was available. Existing service 
regulations at the beginning of World War II contained only two classifications: Secret 
and Confidential. Another quasi-classification, called Restricted (an earlier version of For 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SYSTEMS JOINTLY 
Nf)T RFUnFA S AB L E TO FOREICN NATIONALS 



275 




/(b) (1) 

DOCID: 3188691 : (b) (3)-50 USC 403 

/ (b) (3) -18 USC 798 



Official Use Only, or FOUO), was reserved primarily for information relating to military 
hardware. 71 

Their British allies had three classifications. Above Secret they added the term Most. 
Secret. In 1944 the Army adopted the British three-tiered system, but callek the highest 
category "Top" Secret. COMINT, being among the most sensitive items on tiie menu, was 
classified Top Secret. 72 

When the Army obtained an agreement with GCCS in 1943, the Americans had to 
agree to attach a security caveat associated with COMINT. The most sensitive information 
(which at the time included ENIGMA and MAGIC decrypts) was now handled under a special 
codeword called ULTRA. Information derived from traffic analysis, DF,fand plain text 
received codeword protection, but different codewords were used to/ denote lesser 
sensitivity - thumb and PEARL were two which appeared during World Wiar II. After the 
war the system devolved into two codeword categories: Top Secret /Codeword, and 
everything else. That which related to COMINT but was not derivdd directly from 
communications intercepts began to receive the stamp Handle Via COMINT Channels Only 
(HVCCO). / 

Within cryptology, there were certain projects that received miich more limited 
distributions. BOURBON, the early Soviet problem, was a good example, and VENONA got 
even more limited handling still. This system of ad hoc compartmentatfons continued into 
the early 1960s, when it was augmented by a more formal compartmentation system 
which was applied to SIGINT product reports. The most sensitive cat egory was Gamma, 
I " ~ || A lesser category, 



called Delta, was often used to protect 

Despite the strict secrecy applied to the trade, the number of people indoctrinated for 
COMINT rose steadily as its utility came to be recognized. By 1955 the number of COMINT 
clearances within the federal government (and to contractors) had grown to over 31,000, 
and the Hoover Commission expressed concern about the spread of highly sensitive 
information to such a large group. Of thes a| . , ~| This was 

a far cry from the six people that Friedman hired to carry on the Army's COMINT business 
in 1929 or the two people (Laurance Safford and Agnes Driscoll) who began Navy COMINT 
in the 1920s. 73 

Pulling on the other end of the rope were the people who advocated an even broader 
dissemination, of COMINT. In 1960 Lyman Kirkpatrick (who headed the Kirkpatrick 
Committee - see p. 263) took the Defense Department to task for over-strict rules 
regarding intelligence. (And by intelligence, he was clearly referring to COMINT.) 
Kirkpatrick wrote: 



(b) (1) 

(b) (3J-P.L. 86-36 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 3Y3TEM3 JOINTLY 




276 



DOCID: 3188691 




Entirely apart from the well-known tendency throughout the intelligence community to over- 
classify, the special handling required for a very significant portion of intelligence information 
has at times deprived key personnel of information vital to the successful discharge of their 
responsibilities. 74 

The tug of war between the advocates of secrecy and dissemination was never-ending. 
Nor could the conflict be resolved. As sigint became more successful, it became an 
inevitable victim of its own success. Utility meant dissemination, and dissemination 
meant risk. 



BREACHES IN THE DIKE - THE SECURITY CASES 

The first significant breaches of the security system came from within rather than 
from without. The first two were quiet, and while they both involved significant 
compromise, their very obscurity minimized the damage. Neither became a cause celfebre, 
although one of them became public. The third, however, did major damage primarily 
because it became a public case. 

L' Affaire Weisband 

The first case did the most real damage. But it was so successfully hushed that only a 
few insiders knew that it had occurred. It involved an AFSA analyst named William 
Weisband. 

Weisband was an immigrant. Born in Alexandria, Egypt, in 1908, he had entered the 
United States in either 1925 or 1929. (The record on this point is obscure.) He became a 
citizen in 1938 and, while living in New York City, was inducted into the Army. 
Weisband went into the Signal Corps, and he first began working with ASA in 1943, 
where he became a favorite of Colonel Harold Hayes (who headed the Army's cryptologic 
activities in the Mediterranean). As an accomplished linguist, he was an ASA natural and 
received a transfer from North Africa to Arlington Hall in 1944. The end of the war found 
him still working there, and he hired on as a civilian. ASA needed all the help it could get 
in 1945, and getting a linguist like Weisband was a good day's work. 75 

Unfortunately for ASA, Weisband was a Communist and suspected of being a spy. He 
had handled other agents passing defense information to the Soviets even before he 
entered the Army. He apparently gave up handling agents once he entered the service, 
but after he arrived at Arlington Hall he probably resumed his old avocation. 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL OYDTEMD JOIHTLV 

Krffpm.s-^nmvTnvnui.imia urn iiniuitir; 



277 



J£U*-5€Cfflff UjyJ^RA 



DOCID: 3188691 




At the Hall he had a reputation as a stroller. He wandered around, chatting and 
picking up bits of gossip. He was also adept at getting himself on distribution for 
documents that did not directly concern the work of his section. Highly gregarious, 
Weisband had a wide circle of friends, and he entertained some of the top officers and 
civilians in ASA. His postwar wedding party was talked about as a who's who of Army 
cryptology. 76 

Although Weisband had been on an FBI list of suspected Communists since 1948, he 
was first tagged as a possible spy through the VENONA project. In 1949 a Soviet agent 
identified in VENONA traffic led the FBI to another agent, who led them to another, who 
finally implicated Weisband as a "handler." The FBI began piecing together information 
on this new identity and was aghast to learn in 1950 that Weisband was employed at 
Arlington Hall, the very place whence the venona decrypts were coming. In April 1950 
Wesley Reynolds of the FBI went to Carter Clarke, commanding general of ASA, to report 
the news. Clarke told Reynolds that Weisband had transferred to AFSA. They went to 
Admiral Stone. 

At the time, Weisband was working as a section chief on the Soviet problem. Co- 
workers had already reported him as a possible security risk, and he had been removed 
from access to some of the more sensitive projects while security looked into it. He was 
immediately suspended and interrogated. He denied everything. But the walls were 
falling in on him even as he spoke. In August, as the subject of an unrelated investigation, 
he appeared before a federal grand jury in Los Angeles investigating West Coast 
Communism. Ordered to return for further testimony, he did not comply, was arrested 
and was convicted of contempt, for which he served a year in a federal prison. 

He never returned to AFSA, and in 1951 he was mustered out of federal employment 
by a loyalty-security board in San Fransisco, which, not surprisingly, found that removal 
from federal employment was in the best interest of national security. 77 He remained in 
the Washington area, working as a car dealer and apartment manager, and died in 1967 in 
Fairfax. He never admitted anything. 

The FBI never found out what, if anything, Weisband passed to the Soviets. But his 
close involvement with the Soviet problem argued suggested some of the tightening up of 
Soviet communications was a result of Weisband's activities. Many AFSA employees 
believed, rightly or wrongly, that he was single-handedly responsible for "Black Friday." 
His case instilled a certain paranoia within the profession, and accounted to some degree 
for NSA's extremely close guarding of comint. 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL 3Y3TEM3 JOINTLY 
NOT TTffil . KASABLE TO FOREIQN NATIONALS 



TgeseeKETu^fjjRA 278 



DOCID: 3188691 



The Petersen Case 



JOMeCRETU^RA 



(b) (6), 





Joseph Sydney Petersen, Jr. 



The second security breach 
involved an NSA analyst named 
Joseph Sydney Petersen, Jr. Petersen 
had served with ASA in the South 
Pacific in World War II and had formed 
a close liaison with Dutch cryptologists 
with whom the United States was 
exchanging information. After the war 
this liaison came to an end, but 
Petersen decided on his own to become 
a one-man Third Party office to the 
Dutch intelligence service. He 
collected documents at his home and 
periodically passed them on to Dutch 
intelligence people from the embassy. 
This apparently went on for several 
years. 



Petersen's espionage might never have come to light had it not been for an unrelated 
naval security case involving an officer wh o had been separa ted from the service for 
He implicated Petersen as a j | an d an investigation was 



launched. But when NSA learned that Petersen had close friends at the Dutch embassy, 
the investigators forgot about the| | charge and called in the FBI. In 

September 1953 the FBI began questioning Petersen, and he began revealing his story. A 
search of his apartment uncovered a large number of classified documents, and the FBI 
reckoned that it had enough to prosecute. 78 

The joint NSA-FBI team consulted with Canine in his quarters. The options were to 
try to prosecute or to be satisfied with a simple resignation on his part. This would be the 
first, prosecution under Title 18, and a hearing in open court might bring to light 
information that would be more damaging than just giving Petersen his walking papers. 
But Canine decided to go for prosecution, and he later overrode objections by USCIB that 
the resulting publicity would seriously damage NSA. 

When Petersen's lawyer found out that the government had opted for prosecution, he 
began negotiating a plea bargain. On the day the trial was to begin, he told the judge that 
Petersen was pleading guilty to a violation of Title 18. Petersen fully cooperated with the 
FBI and in return was sentenced to seven years in prison. He was paroled after four years. 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SYSTEMS JOINTLY 
NOT Hffl , E ft SABLE TO FOllMOr^ WAUUMALS 



279 



T0B4eCfifTUiy^RA 



DOCID: 3188691 



The Petersen case was similar to that of a much more notorious case years later, the 
espionage of Jonathan Jay Pollard. He passed cryptologic documents to an ally who he felt 
had been left in the lurch. Along with technical informati on regarding the establishment 
of cryptanalysis courses, Petersen also informed the Dutchj 



J When the FBI searched his house, they found cryptologic! 



documents dealing with several COMINT targets, among them Korea and Communist! 
China. The NSA damage assessment found that the number of documents passed to the 
Dutch was "very large." 79 

When Petersen was indicted, the Associated Press ran a dispatch which was printed ir 
many newspapers across the country. It was the first time the new agency had ever fallen 
under the klieglights. The dispatch described NSA as "essentially a radio monitoring 
service. It has a network of radio receiving stations and other equipment, some of which 
are based overseas. It listens in on the world's radio traffic, both conventional messages 
and coded material . . . secrecy even tighter than that shrouding the Central Intelligence 
Agency surrounds the National Security. Agency. It is not listed by name either in thje 
Washington directory or in the Pentagon phone directory." 80 i 

| 

A number of other details about NSA appeared to bring about a focus on the AgencyJ's 
anonymity. NSA's obscurity had been so perfect that Richard Russell, the chairman of tie 
Senate Armed Services Committee, once asked, "What does the NSA do?" 81 The j6b 
description appearing in the U.S. Government Organization Manual was a marvel jof 
obfuscation: "The National Security Agency performs highly specialized technical and <jo- 
ordinating functions related to the national security." The Petersen case was the firstfto 
pry open the lid of anonymity. 

Martin and Mitchell 



WO 



On 1 August 1960, a small story appeared in the local Washington newspapers. 
Department of Defense employees of the National Security Agency had failed to return 
from vacation and were still missing. 

The story did not stay small very long. NSA's reputation for secrecy guaranteed tjiat 
any news would be big news, and by the next day it was on the front page. On 5 Augustithe 
Department of Defense issued a brief statement that it was now known that the jtwo 
employees, Bernon F. Mitchell and William Martin, had flown to Mexico City and thence 
to Cuba. It was assumed that they were behind the Iron Curtain. 82 [ 



(b) (1) 

(b) (3J-P.L. 86-36 
(b) (3) -50 USC 403 
(b) (3)-18 USC 798 



HANDLE VIA TALEHT KEYHOLE OOMINT CONTROL QYQTEM3 JOINTLY 
NOT BKLBASABLE TO POItEIQH NATIONALS. 




TOJ£5E€RfcT UMBRA 280 



DOCID: 



3188691 




Martin and Mitchell during their press conference in Moscow 
(from theiVeio York Mirror) 



But the most shattering blow came on 7 September. Listeners to Radio Moscow tuned 
in on one of the most remarkable press conferences of the century. Now in Moscow, Martin 
and Mitchell were introduced by the Soviet announcer and proceeded to tell their story in 
exquisite detail. They related how they had become analysts at NSA, full of confidence in 
the integrity of their government. They described how the U.S. government was 
intercepting and breaking communications of its allies (Turkey was named specifically), 
about intentional violations of Soviet airspace to collect intelligence, about alleged 
American plans for a nuclear first strike, and how NSA was trying to exploit Soviet 
communications. They exposed NSA's organization (PROD does this and ADVA does that, 



HANDLE VIA TALENT KEYHOLE COMINT COHTROL SYSTEMS JOINTLY 



281 




DOCID: 3188691 



'(b) (1) 
(b) (3)-50 USC 403 
(b) (3)-P.L. 86-36 



JOWeCKfTU^}RA 



etc.). They described the arrangements between NSA, GCHQ, and Canada. They spent a 
good deal of time on the RC-130 shootdown.in 1958. . It was marvelous theater for 
Khrushchev, who had launched a diplomatic and press offensive against the United States 
in May following the U-2 shootdown. 8 ? 



Martin and Mitchell 



were .voiing mafchpmatfrianc Both had gone into NSG and had 



been assigned together a.\-_ [ Mitchell, who was from California originally, 

was quite bright and had been something of a prodigy in high school. But he was 
extremely immature socially and had a great deal of difficulty adjusting. While he was at 



{Martin was his only close friend. Martin was from Columbus, Georgia. He, too, 

had been labeled as very bright and, compared with Mitchell, was more gregarious. 
Certain questions about their psychological health came up on the polygraph and 
background investigation but were not regarded as serious impediments to employment. 
Once out of the Navy, both pursued college degrees in mathematics, and upon graduation 
both were approached for employment by NSA. They entered on duty as GS-7s in 1957. 8 * 

In 1959 Martin was sent to the University of Illinois for graduate study. While there 
he established Communist associations, and in his private conversations became more and 
more critical of the U.S. government. (He expressed special distaste for the U-2 overflights 
and other reconnaissance activities, and this was reflected in the statements of both men 
to the press in Moscow.) 

At the time, Mitchell was having his own problems and finally sought psychiatric 
advice. The private psychiatrist concluded that Mitchell was in all probability a 
homosexual with serious personality disorders. But the psychiatrist felt that this sexual 
orientation was not the root of his problems. More serious was his poor relationship with 
his own family. 85 

It has been alleged that in 1959, in violation of standing rules for government 
employees, Martin and Mitchell visited Cuba. Despite this, there was no evidence that 
they actually established an espionage relationship with any Communist country prior to 
the defection. 

In June of 1960, just after Martin returned from Illinois, they both applied for annual 
leave. They stated that they were going to visit family on the West Coast. Instead, they 
departed for Mexico City and from there flew to Cuba. Apparently they proceeded from 
there via Soviet trawler to the Soviet Union. 

Back at the office, no one thought to question their absence until they were a week 
overdue. When their supervisor failed to reach them either in their Laurel apartments or 
at their families' homes, the FBI was called in, and there began an intensive investigation. 
The security people concluded that the defections were impulsive and self-initiated. 86 

There was no evidence that they carried off any documents, which argued for the 
theory that they made their decision after going on leave. Still, the route they took 



■ HANDLE VIA TALENT KEYHOLE CO MINT CONTROL 8Y3TEM3 JOINTLY 




DOCID: 3188691 




BRA 



required considerable planning, and they left a defection note in a safe deposit box in a 
Laurel bank, to which they referred during the Radio Moscow broadcast. So the whole 
idea had been evidently a long time abuilding. 87 

The defection precipitated a storm of criticism of NSA. The secretary of defense 
initiated an investigation of NSA security practices. Not to be outdone, the House Un- 
American Activities Committee, chaired by Representative Francis E. Walter of 
Pennsylvania, launched its own investigation. Finally, President Eisenhower directed 
that the FBI initiate an investigation to determine if there were any more potential 
Martins and Mitchells in the ranks at NSA. 88 

All three investigations lambasted the current practice at NSA of granting interim 
security clearances upon successful completion of the polygraph. Canine had authorized 
this procedure as an emergency measure during the Korean War, and it had come into 
routine use. After Martin and Mitchell the practice was terminated, and every employee 
had to have a complete background check in addition to the polygraph before performing 
any sort of classified work at NSA. 89 

The Walter Committee investigation was exhaustive. It spanned thirteen months, 
took two thousand man-hours, covered fifteen states, and resulted in sixteen separate 
hearings. Thirty-four present or former NSA employees testified in closed session. NSA 
and the Department of Defense began by opposing committee access to NSA records, but 
eventually a compromise was worked out, and NSA and the committee finished on 
reasonably good terms. Still, the Agency could not keep the process from being 
sensationalized, and it was stung by a charge by Walter that NSA was a "nest of sexual 
deviates." 90 

The legislative result of the Martin and Mitchell affair was a law which set up the 
legislative authority for NSA's security system. Among other things, it established that 
employment at NSA was appropriate only when it was "clearly consistent with the 
national security." It required a full field investigation prior to employment (i.e., no 
interim clearances) and gave the secretary of defense additional authority to fire NSA 
employees "when such action is deemed necessary in the interest of the United 
States. . . ." 91 

In addition, the committee made certain recommendations concerning NSA's 
administrative practices - for instance, making professional psychological and psychiatric 
services available in assessing applicants and employees who revealed instability. But 
almost all the committee's recommendations had already been implemented, and in its 
final report the committee gave NSA credit for this. The most far-reaching of the changes 
related to the termination of the procedure of granting routine interim clearances, and the 
institution of the so-called three-hour rule, which required that employees three hours 
overdue for work would be reported to the security office. These and a long list of other 
changes became a permanent part of NSA's way of doing business. 92 



HANDLE VTA TALENT KEYHOLE OOMINT CONTROL 3Y3TEM3 JOINTLY 



283 




DOCID: 3188691 



UMBRA 



/'(B) (6) 




As the Walter Committee proceeded, the FBI investigation was winding down. An 
intensive screening of on-board employees had turned up a small number of people whose 
sexual conduct, in light of the sexual mores of the time, might be questioned, and of these 
some twenty-six had been terminated. The proceedings were not all that a civil 
libertarian might have wanted, but they calmed the waters long enough for NSA to begin 
functioning again. 9 * 4 

The damage to NSA's public image was so severe that it overshadowed the cryptologic 
damage that had been done. Because it appeared that the two defectors had not carried 
away documents and that they had not had a previous relationship with the Soviets, just 
what the Soviets did know as a result was speculative. Martin and Mitchell had known 
about the Soviet problem, but they were in a position to give away 

on certain Soviet cipher systems, especially a system called 



information 



_pjBA employees blamed Martin and Mitchell. But no one ever had 



proof. And unlike Weisbahd, their defection was no*t coincident with any sort of "Black 
Friday." This, the most famous (or infamous), of NSA's security cases, was not the most j 
damaging. 

Notes 



1 . Max Davidson, "The Criticoram System," Cryptologic Spectrum, Spring 1975,1 1-1 4. 

2. "NSA's Telecommunications Problems, 1952-1968," CCH Series X.H.4. ., I 

3. "Report of the Secretary's Ad Hoc committee on COMINT/COMSEC (the RoberJsdrtReport), June 1958, in 
CCH Series VI.C.1.11. \ XX N f 

4. "NSA's Telecommunications Problems " j 

5. "NSA's Telecommunications Problems . . . Tordella oral interview; Eisenhower Library papers inGQH Series 
XVI. ""\. I 



6. NSCID7. 

7. Tordella interview. 



(b) (1) 

(b) (3J-P.1. 86-36 
(b) (3)-50 USC 403 
(b) (3) -IB USC 798 



HANDLE VIA TALENT KEYHOLE OOMINT CONTROL OVQTEMS JOINTLY 
NOT RE LEASABLE TO FOREIGN NATIONALD 



284 



DOCID: 3188691 



i(b) (3)-P.L. 86-36 



TQaSECRtTU^RA 



8. Davidson. \ j 

! ! i 

9. "NSA's Telecommunications problems:. . . " 



tZ3 



108. 



10. Eisenhower Library papers, "Report, of the Joint Study Group on Foreign Intelligence Activities," 15 
December 1960, in CCH Series VI.C j. 42. s 

11. "The Baker Panel Report and Assoeialjed Correspondence," in CCH Series Vl.X.1.9. 

12. Ibid.; Eisenhower Library papers. 

13. Baker Panel Report, ACC 1666?, CBR5" 51. 

14. Baker Panel; Eisenhower Library. 
16. Baker Panel; Eisenhower Library. 

16. Baker Panel. i 

17. NSA/CSS Archives, ACC 166^7, CBRF 51. 

18. Eisenhower Library papers. 1 \ 

19. Eisenhower Library papers; Davjd Kahn, The Codebreakere: The Story of Secret Writing (New York: 
MacMillan, 1967), 677; HistoryjoflDA/CRD by Richard Leibler, in CCH Series VI.A.1.6.2. 

20. Baker Panel. Ill 

21. Howe, draft history of the Robertsjm report, in CCH Series VI.C.1.12. 

22. Robertson report. j 

23. Ibid. | 

24. Ibid. 

25. Ibid. I 

26. Ibid. ! 



27. Memo for Mr 



Subject: Oversight; of the National Security Agency by the Department of Defense, 9 



Nov 1967, in CCHberies Vl.C.1.27. 

28. "History of the Electronic Intelligence Coordinating Group, 1955-1958," in CCH Series VI.O.1.6.; Collins, V. 
Ill, 12.; Tordella interview. 

29. CCH Series VI.O.1.3.; VI.B.2.6. 



study, 16-17; interview with Dr. Robert Hermann, NSA OH 45-94, 2 Sept 



30. CCH Series Vl.O.1.3.1 

1994, Charles Baker and Tom Johnson 

31. CCH Series VI.O.1.3.; VI.O.1.2. 

32. NSA/CSS Archives, ACC 39471 , H03-0311-4 

33. CCH Series VI.O.1.3.; NSA/CSS Archives, ACC 39471, HO3-031 1-4. 

34. Melville J. Boucher, "Talomatry [sic] and How it Grew," Part I, Spectrum, Fall 1971, 13; CCH Series 
VI.0.1 .3 .; ACC 39471 , H03-0311-4. 



tudy, 16-26. 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SY3TEMS JOINTLY 

NOT REI.E A . fi fi m F T" F1 TITTI fll H T I'l T1 ■ M L I l\ j h'" " 




DOCID: 3188691 

JSlMKfiETUWWRA 



:f (b) (3)-P.l. 86-36 



The Soviet Land-baseld Ballistic Missile 



35. NSA/CSS Archives, ACC 39741, H03-0311-4; 
Program, 1945-1972: An Historical Overview," manuscript in CCH. 

36. NSA/CSS Archives, ACC 39741, H03-031 1-4. 

37. CCH Series VI.O.1.13. 

38. Eisenhower Library papers. 

39. "Report ofthe Joint Study Group on Foreign Intelligence Activities," [T^e Kirkpatrick Report], 15 Dec. 1960 
in CCH Series VI.C.1. 32. / 

40. Ibid. // 

41. NSA/CSS Archives, ACC 261 15, CBNE 48. 

42. Informal correspondence between Gary Winch and Mel Boucher, 1977. 

43. CCHSeriesVI.1.1.9. 

44. Bob Rush, "AFSCC Tasking: The Development of the Three-Echelon Reporting Concept, 1949-1952 " 
USAFSS history available at AIA, Kelly AFB, Te^as: 

45. "History of the USAF Security Service; Fiscal Year 1955," AIA, Kelly AFB, Teias. 

46. Ibid. 

47. Official USAF biography, Oct 1977, / 

48. Historica l nntn Rpnnrf fnr th e 6>6lst SCG, Semi-Annual, 1956-1964, available at AIA, Kelly AFB; Oral 
interview with; |25March 1993, by Tom Johnson and Jim pierson, NSA OH 15-93. 



50. Ibid. 

51 . Ellerson oral history; 6901 SCG Semi-Annual histories. 
■A Look at the Pacific Experimental Facility," Sperfruro, Winter 1874, 18-21. 



52. 



53. Howe, "Narrative History..., "Part V, Ch. XXVI-XXX. (b)(1) 

/ (b) (3J-P.L. 86-36 

54. Howe, "Narrative History." (b) (3) -50 use 403 

/ (b) (3) -18 (JSC 798 

55. CCH Series VI.HH.12.10. 

56. Collins, V. Ill, 40-41. 

57. Transcript of videotapes of five former directors ^ j itudy, 16; CCH Series VI.NN.1.1. 

58. Ibid.; Tordella interview. 

59. CCH Series VI.D.1.1.; Stone interview; Kahn, The Codebreakers, 705. 

60. Tordella interview. 

61. Tordella biography in CCH Series VI.D.3.4; Tordella interview. 

62. Summary of Statutes Which Relate Specifically to NSA and the Cryptologic Activities of the Government, 
available in CCH. 

63. Ibid. 



HANDLE VIA TALENT KEYHOLE COMINT CONTROL SYSTEMS JOINTLY 
NOT RffT.F ASABLE TO FOREIGN NATIONALS 



TgBSCCRET UjyKjRA 286 



DOCID: 3188691 

TjiB^ecRifujyfBRA 

64. Ibid. 

65. Ibid. 

66. Ibid. 

67. Ibid. 

68. Church Committee Hearings, V. 5, 7-8, ACC 25958-25959, HO-02-0405. 

69. John V. Connorton (LTJG) and Floyd W. Tompkins (LT), "The Need for New Legislation Against 
Unauthorized Disclosures of Communication Intelligence Activities," June 1944, SRH 016. 

70. Ibid. 

71. CCH Series V.C.2.8. 

72. Ibid. 

73. Hoover Commission report. 

74. Kirkpatricfc Committee report. 

75. Benson and Phillips, V. 1, 155. 

76. Ibid., VI, 158. 

77. Ibid., V. I. 

78. Dr. Theodore W. Bauer, "Historical Study: The Security Program of APSA and NSA, 1949-1962," 
unpublished manuscript available in CCH. 

79. Bauer; Kahn, The Codebreakera, 690-92. 

80. NSACSS Archives, ACC 2146, CBOI 37. 

81. Quoted fm Thomas Powers, The Man Who Kept the Secrets: Richard Helms and the CIA (New York- Knoof 
1979), 276. 

82. Wayne Barker, The Anatomy of Two Traitors: The Defection ofBernon F. Mitchell and William H. Martin 
(Laguna Hills, California: Aegean Park Press, 1981). 

83. Press statement; copy available in ACC 27147, CBOI 37. 

84. NSA/CSS Archives, ACC 24399, Gl 1-0502. 

85. Ibid. 

86. Bauer. 

87. Barker, CCH Series X.H.5. 

88. Bauer; Eisenhower Library papers. 

89. Bauer. 

90. ACC 45399, Gl 1-0502. 

91. "Summary of Statutes . . ."; NSA/CSS Archives, ACC 24399, Gll-0502. 

92. Ibid. 



HANDLB VIA TALENT KEYHOLE COMINT CONTROL 3Y3TEM3 JOINTLY 
NOT BF , I , F ftS rt . BLE TO FOItEIOH NATIONALS 



287 



T9&*iCKETUM^RA 



DOCID: 3188691 



93. Ibid. 

94. Ibid. 



HANDLE VIA TALENT KEYHOLE OOMINT CONTROL 0YGTEM3 JOINTLY 
■WOT RBI.EASABLE TO FOEEIO K NATIONALS 



^DWECRETUI^RA 288